Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

Remme PKI (d) protocol

Compare

  Analyzed 1 day ago

Distributed Public Key Infrastructure (dPKI) protocol Remme is a blockchain-based protocol used for issuing and management of public keys to resolve issues related to cybersecurity, IoT connectivity, data integrity, digital copyright protection, transparency etc. Remme core is built on ... [More] Hyperledger Sawtooth platform, allowing to be flexible in language choice during the development process.`Remme core exposes application programming interface based on RPC API. Remme also supports JS, .NET and Java programming libraries that wrap its application programming interface, so that you could easily embed the protocol in your project. [Less]

8.14K lines of code

10 current contributors

over 6 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This
Licenses: No declared licenses

Cloud Firewall

Compare

  Analyzed about 1 hour ago

Cloud Firewall addon's goal is to replicate Kashmir Hill's research series "Life without the big tech" in a web browser. It allows the user, if he or she wishes, to choose and block a big Cloud company using the popup menu. It comes bundled with IP address ranges owned by a cloud/company and hence ... [More] sites, pages, 1p/3p webresources hosted on a user-selected blocked cloud will be blocked from loading. Read more in Project Readme at : https://gitlab.com/gkrishnaks/cloud-firewall/blob/master/README.md [Less]

4.39K lines of code

2 current contributors

about 6 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This

srd

Compare

  Analyzed about 3 hours ago

secure rolodesk -- encrypted sticky notes, also useable as a password vault

3.5K lines of code

1 current contributors

about 1 year since last commit

0 users on Open Hub

Very Low Activity
0.0
 
I Use This
Licenses: No declared licenses

privacytools.io

Compare

  Analyzed about 21 hours ago

🛡️ encryption against global mass surveillance

0 lines of code

72 current contributors

almost 3 years since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: CC0-1-0

CryptoParser

Compare

  No analysis available

As the project name CryptoParser implies, it is a cryptographic protocol parser. The main purpose of creating this library is the fact, that cryptography protocol analysis differs in many aspect from establishing a connection using a cryptographic protocol. Analysis is mostly testing where we ... [More] trigger special and corner cases of the protocol and we also trying to establish connection with hardly supported, experimental, obsoleted or even deprecated mechanisms or algorithms which are may or may not supported by the latest or any version of an implementation of the cryptographic protocol. [Less]

0 lines of code

1 current contributors

0 since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: mozilla_p...

CryptoLyzer

Compare

  No analysis available

As the project name CryptoLyzer implies, it is an cryptographic protocol analyzer. The main purpose of creating this application is the fact, that cryptography protocol analysis differs in many aspect from establishing a connection using a cryptographic protocol. Analysis is mostly testing where we ... [More] trigger special and corner cases of the protocol and we also trying to establish connection with hardly supported, experimental, obsoleted or even deprecated mechanisms or algorithms which are may or may not supported by the latest or any version of an implementation of the cryptographic protocol. [Less]

0 lines of code

1 current contributors

0 since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: mozilla_p...

sovrin

Compare

  Analyzed about 20 hours ago

Sovrin is a global utility for self-sovereign identity--that is, an identity that nobody controls except its natural owner, that can't be taken away or stripped of its privacy or manipulated through unreasonable terms of service. Sovrin is a specific instantiation of Indy, using a governance ... [More] framework as the legal foundation of the Sovrin Network. The Sovrin Foundation provides the business, legal, and technical support for the Sovrin Network as a transparent and neutral party. If you'd like to use Sovrin's identity toolset in your system, we recommend that you first check out the indy-sdk; it offers a C-callable library plus convenience wrappers in java, python, .NET, and more. Documentation is currently light, but the API is liberally commented. [Less]

1.25K lines of code

19 current contributors

7 months since last commit

0 users on Open Hub

Very Low Activity
0.0
 
I Use This
Licenses: No declared licenses

TACOS-app

Compare

  Analyzed 1 day ago

TACOS provides a spam detection feature. It allows you to check for spam phone numbers from your incoming calls. Our database of spam is built among other thanks to the MISP project. Of course you can also contribute to our database by reporting spam phone numbers. Besides that, TACOS is also an ... [More] awareness application for cybersecurity. We included some tools like a password cards generator, some security and privacy awareness games. [Less]

2.6K lines of code

5 current contributors

over 3 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This

TACOS-server

Compare

  Analyzed about 11 hours ago

TACOS (https://github.com/CASES-LU/TACOS) back-end services.

933 lines of code

2 current contributors

over 1 year since last commit

0 users on Open Hub

Very Low Activity
0.0
 
I Use This

Fit4Cybersecurity

Compare

  Analyzed about 9 hours ago

A self-assessment tool to help business owners implement a better cybersecurity strategy.

9.92K lines of code

3 current contributors

1 day since last commit

0 users on Open Hub

Very Low Activity
0.0
 
I Use This