AlgorithmsMeetup / CryptographyLinks
RSA, Diffie-Hellman, Signing, asymmetric and symmetric keys
☆13Updated 8 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below
Sorting:
- Quantum Insert☆214Updated 7 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- ☆89Updated 9 years ago
- initial upload☆19Updated 10 years ago
- Distributed File Storage Using JavaScript Botnets☆114Updated 12 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Updated 12 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆926Updated 10 years ago
- Cyber Security Base with F-Secure☆53Updated 6 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- ☆81Updated 9 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 10 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Anti-keylogger/anti-rat application for Windows☆252Updated 4 years ago
- You'll never take me alive.☆85Updated 11 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- My solutions to Matasano Cryptopals challenge.☆30Updated 11 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- Hacker OPSEC☆101Updated 7 years ago
- Educational SSH client☆124Updated 9 years ago
- Hashcrack.org GPU-accelerated password cracker☆85Updated 9 years ago
- ASM Malicious code - PE infector☆72Updated 8 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 10 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 7 years ago
- An implementation of the Advanced Encryption Standard (AES) algorithm meant for study to go along with "A Stick Figure Guide to the Advan…☆427Updated 16 years ago
- Quickly Change Your MAC Address in OSX to a Random Address.☆13Updated 10 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Updated 5 years ago
- Berliner Spargel OS☆12Updated 11 years ago
- PORTAL of Pi - RaspberyPi based PORTAL device. Certified UNIX Network Technicians only!☆338Updated 8 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 8 years ago