Cryptography for Pentesters Course [Arabic]
☆26Feb 3, 2026Updated last month
Alternatives and similar repositories for Cryptography-for-Pentesters
Users that are interested in Cryptography-for-Pentesters are comparing it to the libraries listed below
Sorting:
- ☆62Feb 10, 2026Updated 3 weeks ago
- This Repo is under constant update. We will update all the notes while preparing for OSCP. If anyone want to contribute you are most welc…☆11Aug 29, 2019Updated 6 years ago
- SLSA Proposals☆11Jan 29, 2024Updated 2 years ago
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- The VulnCheck Github Action☆13Feb 25, 2026Updated last week
- Dast tool☆13Jul 28, 2023Updated 2 years ago
- ☆17Dec 18, 2025Updated 2 months ago
- ☆14Jun 19, 2024Updated last year
- ☆12Nov 2, 2022Updated 3 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Sep 19, 2019Updated 6 years ago
- Hi, these are some scripts that i use whenever a mobile pentest task comes up . Hope they would be helpful for someone☆13Dec 14, 2023Updated 2 years ago
- Ph33r No Number - OSINT Script☆15Sep 25, 2020Updated 5 years ago
- ☆19Jul 17, 2025Updated 7 months ago
- Carving tool based in Radare2 & Yara☆17Oct 30, 2018Updated 7 years ago
- A Modern Bug Bounty and Security Research Management Platform☆97Jun 12, 2025Updated 8 months ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Aug 5, 2024Updated last year
- ☆18May 18, 2025Updated 9 months ago
- Scapy sockets to communicate with Bluetooth controllers☆20Updated this week
- OWASP Foundation Web Respository☆17Jun 1, 2022Updated 3 years ago
- ☆17Aug 19, 2021Updated 4 years ago
- Advanced Cluster Security for Kubernetes tutorial☆14Apr 22, 2024Updated last year
- This repository offers a detailed taxonomy of existing AI-driven security solutions tailored for DevSecOps, highlighting the current rese…☆19Jul 2, 2025Updated 8 months ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- A security-first linter for code that shouldn't need linting☆18Sep 12, 2023Updated 2 years ago
- CTFScore or the "Advanced CTF Scoring System" is a system intended to track the IDS alerts generated during the course of a CTF and provi…☆22Jul 26, 2022Updated 3 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆16Aug 26, 2013Updated 12 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Production‑ready SDLC pipelines for every language, every stage, and every DevOps ecosystem.☆21Feb 28, 2026Updated last week
- A proof-of-concept SLSA provenance generator for Jenkins☆24Jul 29, 2024Updated last year
- Intentionally Vulnerable Demo App: .NET MVC, WCF, WebAPI, Web Forms☆21Feb 10, 2024Updated 2 years ago
- Solution for the Practice Round of Google Hash Code 2017 - Score: 749873☆13Feb 21, 2017Updated 9 years ago
- SLSA implementation of Community Specification governance☆24Jan 15, 2026Updated last month
- Simple tool that allows you to detect imposter commits in GitHub Actions workflows.☆26Dec 17, 2024Updated last year
- Automate the process of compacting the WSL virtual disk☆17Nov 27, 2020Updated 5 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆25Jul 28, 2024Updated last year
- Clone all bitbucket repositories from all your workspaces☆27Dec 31, 2025Updated 2 months ago
- pwk notes and scripts☆14Apr 29, 2015Updated 10 years ago
- ☆25Nov 8, 2024Updated last year