-
ClearBank
- Bristol, United Kingdom
- https://www.scottbrady.io
- @scottbrady@hachyderm.io
- @scottbrady91
- in/scottbrady91
Stars
JWT style token handlers for Branca and PASETO in .NET. EdDSA support for Microsoft.IdentityModel.
An increasingly less-brief guide to Mastodon
Token Exchange (RFC 8693) implementation for IdentityServer
JWA, JWS, JWE, JWT, JWK, JWKS for Node.js, Browser, Cloudflare Workers, Deno, Bun, and other Web-interoperable runtimes
A flexible developer tool that runs processes and responds to filesystem changes
Asynchronous delegated key generation without shared secrets (DRAFT)
yubikey-agent is a seamless ssh-agent for YubiKeys.
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, se…
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
novotnyllc / bc-csharp
Forked from bcgit/bc-csharpPortable version of Bouncy Castle with support for .NET 4, .NET Standard 2.0, MonoAndroid, Xamarin.iOS, .NET Core
A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.
🔑 Paseto.NET, a Paseto (Platform-Agnostic Security Tokens) implementation for .NET
Certification Test Tools Resources. For security and privacy related issues email tools@fidoalliance.org
As simple interoperability app for FIDO2 servers [Please install me for interop]
libsodium for .NET - A secure cryptographic library
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
🔏 A small WebAuthn API wrapper that translates to/from pure JSON using base64url.
A C# implementation of Concise Binary Object Representation (RFC 8949).
IdentityModel extensions for .Net
A high performance offensive security tool for reconnaissance and vulnerability scanning