AlgorithmsMeetup / CryptographyLinks
RSA, Diffie-Hellman, Signing, asymmetric and symmetric keys
☆13Updated 8 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below
Sorting:
- Distributed File Storage Using JavaScript Botnets☆114Updated 12 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- ☆81Updated 9 years ago
- Lightweight TCP botnet coded in C++☆27Updated 7 years ago
- Quantum Insert☆214Updated 7 years ago
- Bunny is a wireless. meshing, darknet that uses 802.11 to hide its communications☆926Updated 10 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 10 years ago
- Anonymize and fracture network traffic/Internet access over a point-to-point wireless link or through TCP->GSM->wifi tunnel (advanced res…☆363Updated 10 years ago
- Cyber Security Base with F-Secure☆53Updated 6 years ago
- You'll never take me alive.☆85Updated 11 years ago
- ☆115Updated 10 years ago
- ☆89Updated 9 years ago
- pyCryptoCat - A CryptoCat standalone python client.☆24Updated 12 years ago
- The CryptoParty Handbook☆532Updated 5 years ago
- Ontological counterpart to whoami that explains the meaning of life.☆25Updated 8 years ago
- Script to silently intercept SSL on computers infected with Superfish malware☆28Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- HTTPS Everywhere rulesets for hidden services and eepsites.☆173Updated 8 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Entropic Password Manager Generator is a cross-platform, most secure and storageless password manager that generates passwords☆22Updated 4 years ago
- A rogue-USB-device defeat program for Windows.☆189Updated 3 years ago
- Encryption Works: How to Protect Your Privacy in the Age of NSA Surveillance☆355Updated 5 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 7 years ago
- Material related to my talks at various conferences on using Continuous Integration tools (Jenkins, Teamcity, Go, Hudson, CruiseControl) …☆123Updated 9 years ago
- Generate strong passwords using /dev/urandom 👻☆15Updated 8 years ago
- CLI for keybase.io written in/for Node.js☆300Updated 9 years ago
- Silently extract a YubiKey serial number☆20Updated 5 months ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- Hacker OPSEC☆101Updated 7 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago