RSA, Diffie-Hellman, Signing, asymmetric and symmetric keys
☆13Mar 6, 2017Updated 8 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below
Sorting:
- --DEPRECATED--. Use other top level repository under IntellectualHeaven.☆42Jan 30, 2015Updated 11 years ago
- Operating System: CPU Scheduling Algorithms☆10Aug 18, 2020Updated 5 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Liferay elasticsearch integration☆12Jan 3, 2018Updated 8 years ago
- Fully functioning sample code for my Unit Testing an ASP.NET Core 6 MVC Web Application course☆10Mar 31, 2022Updated 3 years ago
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- An efficient Python script to obfuscate code by renaming identifiers.☆12Jun 29, 2023Updated 2 years ago
- A Code highlighting plugin for OllyDbg 2.01.☆16Dec 10, 2014Updated 11 years ago
- This is the home of the Open Source Hardware Vacuum Cleaner Project.☆35Apr 6, 2013Updated 12 years ago
- Advanced Splunk 8, published by Packt☆11Dec 15, 2025Updated 2 months ago
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum…☆17Jun 12, 2025Updated 8 months ago
- golang microservice prototype☆10Oct 23, 2016Updated 9 years ago
- Various Crypter Project☆10Feb 26, 2014Updated 12 years ago
- ☆20Apr 7, 2024Updated last year
- Expeditus is a loader that executes shellcode on a target Windows system. It combines several offensive techniques in order to attempt to…☆13May 30, 2022Updated 3 years ago
- Source code for 'SQL Server T-SQL Recipes' by David Dye, Jason Brimhall, Timothy Roberts, Wayne Sheffield, Joseph Sack, and Jonathan Genn…☆14Mar 28, 2017Updated 8 years ago
- Docker setup for Evilginx version 3.0. For educational purposes only!☆13May 16, 2023Updated 2 years ago
- A brookshear virtual machine written in Go☆10Sep 5, 2019Updated 6 years ago
- Tutorials from vogella.com in the category technology☆11May 9, 2019Updated 6 years ago
- A repository of LIVE malwares for your own joy and pleasure☆16Apr 21, 2016Updated 9 years ago
- Tools to recover, extract and decrypt Atomic wallets☆13Dec 12, 2025Updated 2 months ago
- Leaked Mirai Source Code for Research/IoC Development Purposes☆16Oct 31, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/des-linear-and-differential-cryptoanalysis☆10Nov 15, 2015Updated 10 years ago
- Hidden Features Full Hidden Access Hidden Desktop Hidden Browsers Hidden Cmd Clone Profile Hidden PowerShell Hidden Explorer Hidde…☆19Sep 30, 2022Updated 3 years ago
- SpamAssassin plugin for detecting VBA macros in Microsoft Office Documents☆11Mar 3, 2016Updated 10 years ago
- an ancient http botnet☆15Apr 4, 2015Updated 10 years ago
- Real-time websocket stream of GPS events on a fancy SVG world map☆19Jan 5, 2022Updated 4 years ago
- CTF write-ups from the VulnHub CTF Team☆10Mar 23, 2018Updated 7 years ago
- Windows Privilege Escalation☆18Jun 11, 2022Updated 3 years ago
- Source code for 'Introduction to 3D Game Engine Design Using DirectX 9 and C#' by Marshall Harrison☆10Mar 30, 2017Updated 8 years ago
- Brand New Code Injection for Windows☆13Oct 28, 2016Updated 9 years ago
- KeyGen is a generator for keys and passwords.☆22Feb 21, 2026Updated last week
- Practical Cryptoanalysis☆12Nov 23, 2015Updated 10 years ago
- Utility library for network protocols on the JVM☆12Updated this week
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- Code from the book, "Learn to Program with Minecraft Plugins", ported from Bukkit to CanaryMod.☆13Oct 19, 2014Updated 11 years ago
- Just another repository for malware development☆13May 12, 2024Updated last year
- An api and backend code to gather the impacts of diverse scholarly products online.☆58Nov 19, 2014Updated 11 years ago