suicideCrypt
Volume destroyer
A toolset for creating cryptographically strong volumes with self-destruct mechanisms, providing audit trails to prove irrecoverability upon tampering or destruction.
A toolset for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command
8 stars
1 watching
0 forks
Language: Perl
last commit: about 7 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| An app that generates and destroys distracting messages with customizable features and encryption options. | 2 |
| A tool designed to securely destroy sensitive data on computers by overwriting files and partitions with random or fixed patterns. | 77 |
| A data wiping tool that securely destroys sensitive information by overwriting it multiple times | 20 |
| A revamped and optimized hash cracking rule designed to improve efficiency while maintaining performance | 410 |
| An application that randomly destroys virtual machines in a BOSH-managed environment to test resilience and availability. | 62 |
| A collection of Burp Suite encryption plug-ins supporting various encryption algorithms and execution of JavaScript code for cracking encrypted web applications. | 1,461 |
| An RxJS operator that automatically unsubscribes from observables when the component is destroyed. | 1,741 |
| A file crypter that uses the AES algorithm to encrypt files and sends the encryption key to a remote server for decryption. | 736 |
| A lightweight encryption library supporting both asymmetric and symmetric encryption methods. | 104 |
| A lightweight cryptographic library providing simple functions to solve common problems. | 637 |
| Distributed ID generator for generating unique IDs across multiple data sources | 21 |
| A utility for automatically generating and sending multiple payload variations to test GraphQL APIs' strength against common attacks such as brute-forcing, password spraying, and fuzzing. | 318 |
| A tool designed to crack and extract hidden data from encrypted files using brute-force techniques. | 1,048 |
| A library that removes common unicode confusables/homoglyphs from strings | 105 |
| A tool using machine learning to create fake domains by exploiting Unicode encoding vulnerabilities in IDN policies | 95 |