ChiragVaghela10 / CryptographywithTCP-IPView external linksLinks
This repository is about transferring the secure data from one computer to another with the help of socket programming using client-server architecture. The data will be secured by implementing RSA(cryptography) Algorithm. For simplicity only 64-bit security is used unlike real implementation which uses 128-bit to 256-bit security(used by banks,…
☆12Mar 31, 2022Updated 3 years ago
Alternatives and similar repositories for CryptographywithTCP-IP
Users that are interested in CryptographywithTCP-IP are comparing it to the libraries listed below
Sorting:
- ☆13May 8, 2015Updated 10 years ago
- Image Pre-processing to improve OCR accuracy.☆20Jul 13, 2016Updated 9 years ago
- Simple UDP and TCP servers and clients. Support authentication and file exchange.☆25Dec 30, 2020Updated 5 years ago
- OS Project: Sleeping Teaching Assistant using mutex locks and semaphores.☆10Mar 14, 2020Updated 5 years ago
- SAPProx is a proof of concept tool for intercepting and modifying SAP GUI (DIAG protocol) traffic.☆13Apr 20, 2017Updated 8 years ago
- 京东评论,情感分析,LDA,决策树,评论爬取,Python,emotional analysis of e-commerce comments☆13May 14, 2023Updated 2 years ago
- Flatline is a server prototype to which Signal-compatible clients can connect.☆18Feb 6, 2026Updated last week
- IPFS remote pinning service by using Crust☆10Aug 14, 2025Updated 6 months ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- A proof of concept which uses C to write to shared memory and python to read from it as a form of IPC☆13Aug 22, 2013Updated 12 years ago
- 数据结构——校园导航系统☆10Apr 17, 2015Updated 10 years ago
- ☆11Dec 14, 2016Updated 9 years ago
- Encrypt and Decrypt message using Ethereum keys.☆12Mar 6, 2020Updated 5 years ago
- Kernel module to hide tcp connections from an attacker ip address☆11Mar 24, 2022Updated 3 years ago
- A memory manager for Raspberry Pi☆12Jun 3, 2025Updated 8 months ago
- HTTP Brute Forcer (Java replacement for SP's CrowBar).☆12Apr 20, 2017Updated 8 years ago
- A platform for hackers to show off their creations.☆14Jul 9, 2018Updated 7 years ago
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- An authenticated peer-to-peer network overlay☆10Oct 23, 2025Updated 3 months ago
- ☆10Mar 5, 2018Updated 7 years ago
- Stereo Vision -- attempt to build 3D model from multiple view image sets☆15Jun 19, 2012Updated 13 years ago
- ☆10Feb 17, 2021Updated 4 years ago
- script loader that allows require() from lua scripts in redis☆11May 15, 2016Updated 9 years ago
- sniff inputs type☆10Aug 3, 2017Updated 8 years ago
- 仿一些招聘网站搜索做的多条件筛选☆10Nov 22, 2016Updated 9 years ago
- A simple example of how to solve Kaggle's "Titanic: Machine Learning from Disaster" challenge using Python and scikit-learn☆12May 21, 2014Updated 11 years ago
- Redis module for Fixed Point Number data type☆13Aug 29, 2018Updated 7 years ago
- Distributed hash-table node☆12Oct 2, 2023Updated 2 years ago
- A question answering research dataset of movie-related factoids☆10Mar 21, 2016Updated 9 years ago
- 解析PE文件,对PE文件进行静态变形,简单的加密壳。☆10Dec 26, 2020Updated 5 years ago
- Curve25519 ECIES☆10Oct 18, 2016Updated 9 years ago
- Intrinio Web SDK for Real-Time Stock, Forex, and Crypto Prices☆11Dec 2, 2022Updated 3 years ago
- ☆11Sep 14, 2017Updated 8 years ago
- Iodine: Verifying Constant-Time Execution of Hardware☆15Mar 29, 2021Updated 4 years ago
- an app for charting forex using some principles of the wyckoff method☆11Sep 1, 2015Updated 10 years ago
- Decentralized IPFS Pinning Service AVS☆13Oct 28, 2024Updated last year
- Elgamal Encryption using Elliptic Curve Cryptography in Python 2.7☆13Nov 17, 2018Updated 7 years ago
- go-libp2p's TLS encrypted transport☆16May 25, 2022Updated 3 years ago
- A library for near real time processing of images with a focus on industrial applications.☆14Feb 19, 2020Updated 5 years ago