![]() ![]() (): Compliance automation framework, focused on SOC2. (): Generator and supporting evidence for security of the Pluto/Eris half-pairing cycle of elliptic curves. Our non-traditional approach has a bias towards action, as we build trust across domains, provide unprecedented access, and deliver and implement solutions. Our goal is to provide the tools and insights needed for companies and governments to outpace emerging global security threats. (): builds solutions to enhance the security of the global commons. (): is a VM that is built from the ground up with a large amount of security vulnerabilities. How to systematically secure anything: a repository about security engineering (): OASIS CACAO TC: Official repository for work of the () ![]() ![]() () is a test suite designed to test the distribution, collision, and performance properties of non-cryptographic hash functions. (): Crypto 101 is an introductory course on cryptography, freely available for programmers of all ages and skill levels. (): Vulmon is a vulnerability search engine. (): Tink is a multi-language, cross-platform library that provides cryptographic APIs that are secure, easy to use correctly, and hard(er) to misuse. ![]() (): Lecture notes for a course on cryptography (): Criminal IP is a specialized Cyber Threat Intelligence (CTI) search engine that allows users to search for various security-related information such as malicious IP addresses, domains, banners, etc. (): is the world's first search engine for Internet-connected devices. **Please contribute through pull requests*- )Īnother great list: () ![]()
0 Comments
Leave a Reply. |