Learn the basics of cryptography throughout history.
☆21Jan 30, 2021Updated 5 years ago
Alternatives and similar repositories for cryptojourney-content
Users that are interested in cryptojourney-content are comparing it to the libraries listed below
Sorting:
- A static website template for security pages.☆54Jul 19, 2025Updated 8 months ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- Code fragmentation technique for scripting languages☆18Jan 11, 2021Updated 5 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Jun 19, 2014Updated 11 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- 🔐 Identify and Parse Web Security Policies Files in R☆11Aug 18, 2019Updated 6 years ago
- Importable Firefox profile for use with i2p. Also usable with Tor Browser on most platforms.☆17Jul 4, 2019Updated 6 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- A security.txt parser for PHP☆12Oct 8, 2017Updated 8 years ago
- A package for serving `security.txt` in Laravel 5.5+, based on configuration settings. https://securitytext.org/☆10Mar 21, 2019Updated 7 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Oct 19, 2023Updated 2 years ago
- Ruby gem to help prevent Server Side Request Forgery☆42Mar 9, 2026Updated last week
- Install Script for CS☆11Aug 26, 2019Updated 6 years ago
- npm package for express applications☆17Dec 22, 2020Updated 5 years ago
- A collection of response templates for invalid bug bounty reports.☆90Feb 26, 2018Updated 8 years ago
- Directory/file & DNS busting tool written in Go☆14Nov 26, 2019Updated 6 years ago
- ☆12Oct 10, 2024Updated last year
- A list of universities with vulnerability disclosure policies☆13Jul 10, 2020Updated 5 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- mdbook preprocessor for generating checklists and indexes☆14Nov 29, 2022Updated 3 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆74Dec 4, 2019Updated 6 years ago
- CVE-2021-1994、CVE-2021-2047、CVE-2021-2064、CVE-2021-2108、CVE-2021-2075、CVE-2019-17195、CVE-2020-14756、CVE-2021-2109☆12Sep 13, 2021Updated 4 years ago
- Automation script to download JSON MISP files from a SFTP server and import them via API to a MISP instance.☆15May 12, 2023Updated 2 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Python code for generating a signature for Json Web Tokens☆26Jun 24, 2020Updated 5 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- ☆12Aug 8, 2024Updated last year
- Tools related to RFC 9116 (security.txt)☆25Feb 11, 2025Updated last year
- BountyDash is a tool to combine your rewards from all platforms, giving you insights about your progress and bug hunting patterns.☆163Apr 24, 2025Updated 10 months ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- For Python ID X Traveloka Jakarta Spesial Kartini☆10Apr 20, 2018Updated 7 years ago
- adrw's dotfiles☆14Mar 12, 2026Updated last week
- Converts a hostname (or URI) to IP address using your local resolver☆26Mar 31, 2024Updated last year
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- Website - using Jekyll and Bootstrap☆12Updated this week
- deadsimple BSD Security Advisories and Announcements☆19Mar 12, 2026Updated last week