abhishekdeokar / sockets-with-encryptionView external linksLinks
socket program to send data with encryption
☆13Jun 1, 2021Updated 4 years ago
Alternatives and similar repositories for sockets-with-encryption
Users that are interested in sockets-with-encryption are comparing it to the libraries listed below
Sorting:
- Free VPS is a everyone for free to use VPS. Try it for testing vps for free!☆11Feb 12, 2024Updated 2 years ago
- Enhance your gaming strategy with Crash Predict, a Python-based dashboard for duelbets.com crash game, powered by advanced AI models. Pre…☆19Dec 12, 2023Updated 2 years ago
- Get Free Linux VPS With GPU + 12 GB Ram ! With Colab! This Server will working 12 hours If you have Colab Pro Its will Working More Times…☆24Sep 2, 2021Updated 4 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Proxy middleware for Deno Oak HTTP servers. 🐿 🦕☆42Jan 28, 2024Updated 2 years ago
- Show Window proxy settings☆16Oct 19, 2016Updated 9 years ago
- Super good awesome☆10Jan 15, 2023Updated 3 years ago
- An example setup for integrating the oso policy engine logic within a FastAPI application.☆10Dec 5, 2020Updated 5 years ago
- Ten Thousand Failures Blog☆12Jul 22, 2014Updated 11 years ago
- 🚀 SHADOW is an advanced, customizable web proxy that allows users to access the internet without any restrictions. It is a tool that pro…☆11Mar 24, 2023Updated 2 years ago
- ☆10Nov 8, 2019Updated 6 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- NavSec is the most comprehensive passive web vulnerability and privacy scanner. It performs real-time security analysis directly in your …☆23Sep 13, 2025Updated 5 months ago
- A coverage library for Chisel designs☆11Mar 12, 2020Updated 5 years ago
- A simple baremetal program template for RISC-V inspired from riscv benchmark tests☆11Apr 17, 2018Updated 7 years ago
- ☆12Feb 7, 2023Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Aug 18, 2021Updated 4 years ago
- ☆11Jan 19, 2024Updated 2 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Jul 13, 2023Updated 2 years ago
- Rust program for interfacing with the gigabyte driver to gain access to powerful primitives such as arbitrary kernel memcpy.☆17Nov 26, 2022Updated 3 years ago
- ☆12Sep 6, 2023Updated 2 years ago
- ☆14Dec 24, 2025Updated last month
- ☆12Jun 4, 2025Updated 8 months ago
- Tiny MATLAB-to-C converter (TMC Compiler)☆13Oct 26, 2020Updated 5 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- ☆12Apr 17, 2024Updated last year
- A service container for interacting with SRA's VECTR☆16Apr 9, 2025Updated 10 months ago
- SMVs: Enforcing Least Privilege Memory Views for Multithreaded Applications☆13Jul 7, 2022Updated 3 years ago
- Securing Embedded Systems with Return Address Integrity☆15Aug 19, 2024Updated last year
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 5 months ago
- LLM-Powered Code Security Scanning☆19Apr 2, 2025Updated 10 months ago
- Various scripts I've built for CTFs, hacking challenges, and for learning how various existing tools work☆17Mar 21, 2023Updated 2 years ago
- Content for Udacity's Machine Learning curriculum☆14Jul 29, 2016Updated 9 years ago
- A short scraper looking for a POC of CVE-2024-49112☆14Dec 16, 2024Updated last year
- My modified version of UV with built in middleware and script injection☆10Oct 9, 2023Updated 2 years ago
- A Verilog RTL model of a simple 8-bit RISC processor☆17Jan 15, 2019Updated 7 years ago
- ☆16May 17, 2019Updated 6 years ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Jan 15, 2024Updated 2 years ago
- My Unix dotfiles. You might find something useful in there☆21Mar 26, 2016Updated 9 years ago