{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"HerraduraKEx","owner":"Caume","isFork":false,"description":"Herradura is a Key exchange scheme in the style of Diffie-Hellman Key Exchange, based on bitwise operations.","allTopics":["c","lightweight","golang","iot","arduino","python3","assembly-language","internetofthings","encryption-algorithm","bitwise-operation","key-exchange-algorithm","bitwise-rotation","cryptography"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":1,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-29T18:15:56.393Z"}},{"type":"Public","name":"DDP","owner":"Caume","isFork":false,"description":"Dynamic Decryption Procedures","allTopics":["cryptography","reverse-engineering","malware-analysis","malware-research"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-11-23T13:26:51.485Z"}},{"type":"Public","name":"CaumeDSE","owner":"Caume","isFork":false,"description":"REST Data security platform to protect and process files in untrusted environments (e.g. public cloud IaaS, IoT)","allTopics":["c","lightweight","iot","cryptography","database","rest-api","perl","memory-database","sqlite3","nosql-database","secure-database"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":2,"starsCount":3,"forksCount":1,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-05-07T21:20:21.493Z"}},{"type":"Public","name":"MAPSI","owner":"Caume","isFork":false,"description":"Manual de Prácticas en Seguridad Informática (Spanish)","allTopics":["c","asm","information-security","knoppix","workbook","spanish-language"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-03-01T02:12:05.894Z"}},{"type":"Public","name":"PerlFileScanners","owner":"Caume","isFork":false,"description":"Perl scripts to find regex patterns in files (useful for compliance, audits and forensics).","allTopics":["logs","perl5","audit-logs","regular-expressions","forensic-analysis","compliance-check"],"primaryLanguage":{"name":"Perl","color":"#0298c3"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-04-01T19:54:17.723Z"}},{"type":"Public","name":"CIAT","owner":"Caume","isFork":false,"description":"Crypto implementations analysis toolkit","allTopics":["cryptography","reverse-engineering","malware-analysis","cryptoanalysis","computer-forensics","entropy-measures"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-02-01T00:38:19.890Z"}}],"repositoryCount":6,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}