/

encrypted-connections

platform-independent
reverse-shells
antiforensics
post-exploitation
zero-configuration
no-dependencies
kafka
end-to-end-encryption
key-management
identity
encrypted-messages
credentials
security
e2ee
rust
authentication
zero-trust
authorization
messaging
trust
encryption

malwaredllc/byob
354日前8.7k

An open-source post-exploitation framework for students, researchers and developers.

build-trust/ockam
354日前4.3k

Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.