This tool is a versatile implementation of the Affine Cipher, a classical encryption algorithm that combines modular arithmetic and linear algebra. It enables users to encode and decode messages using a pair of keys, offering a straightforward and effective approach to securing information.
☆23Jul 26, 2024Updated last year
Alternatives and similar repositories for AffineCipher
Users that are interested in AffineCipher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A potent tool designed for efficiently cracking MD5 hashes using an online wordlist. This repository provides a robust solution for secur…☆13Jul 26, 2024Updated last year
- "TheJudgment," a captivating steganography challenge that will test your skills in uncovering hidden messages. Immerse yourself in a worl…☆17Jun 1, 2024Updated last year
- Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given …☆20Jul 26, 2024Updated last year
- Config file of my Github profile that comes as a description about Me, My Studies as well as the projects That I do☆17Jan 27, 2026Updated 2 months ago
- Discover sorting algorithms and core data structures implemented in multiple languages in my repository. Perfect for beginners and experi…☆43Aug 16, 2024Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Th…☆52Jan 20, 2026Updated 2 months ago
- A Responsive Landing Page For A Restaurant☆17Jun 1, 2024Updated last year
- HKG's Official Website☆34Apr 19, 2024Updated last year
- Landing Page For Computers Repair Services Website☆14Jun 1, 2024Updated last year
- Single-Page Application For An Educational Website☆52Apr 19, 2024Updated last year
- This repository consists of 1337/42 Pool as well as the submodules of each 42 project that I have made, check the repository for more inf…☆13Dec 28, 2024Updated last year
- 42 header for neovim made with lua☆11Aug 17, 2022Updated 3 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆16Jul 13, 2023Updated 2 years ago
- Open Redirect scanner☆18May 20, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A NestJS boilerplate with TypeORM and authentication☆17Apr 29, 2025Updated 11 months ago
- My attempt to reverse the Discord nitro token generation function.☆29Sep 28, 2024Updated last year
- A load balancer supporting multiple LB strategies written in Go☆27May 21, 2021Updated 4 years ago
- Ray-casting game for wasting productive time.☆11May 23, 2021Updated 4 years ago
- AMADIL is a powerful package that helps you build projects by generating JavaScript components and pages with their respective routes. It…☆18Nov 30, 2024Updated last year
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆16Sep 20, 2021Updated 4 years ago
- A tool that encrypt and hide your data inside your images.☆29Oct 24, 2021Updated 4 years ago
- BnademOverFlow's Official Website☆36Mar 6, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- a reliable C based exploit and writeup for CVE-2021-3560.☆39Jun 23, 2021Updated 4 years ago
- RCE exploit for Microsoft Exchange Server (CVE-2021-26855).☆22Apr 23, 2022Updated 3 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- PlayGround with JWTs used as OAuth 2.0 Bearer Tokens to encode all relevant parts of an access token into the access token itself instead…☆16Aug 21, 2021Updated 4 years ago
- FleakOS Kernel Source Tree☆27Oct 11, 2024Updated last year
- Ressources for following my youtube C tutorials☆13Jun 25, 2021Updated 4 years ago
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- A full Rest-API With Oauth2 and JWT for request & response a JSON file Using FastAPI and SQLAlchemy 🔑☆16Jul 13, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- VSCode sidebar themes Website where you can copy & share your Sidebar Themes.☆21Oct 4, 2024Updated last year
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Aug 30, 2021Updated 4 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆20May 19, 2023Updated 2 years ago
- Rayomd is a gathering information Framework for pentesters and bug bounty hunters☆28Jan 24, 2023Updated 3 years ago
- A Next.js, Tailwind CSS blogging Template. Used to Create my Blog☆23Jun 1, 2023Updated 2 years ago
- The Minishell project is a significant component of the 42 School curriculum. It involves creating a simplified shell program, similar to…☆45Nov 24, 2023Updated 2 years ago
- Trolling Keyloggers by Forcing them to log Specific Text then freezing them☆22Jul 30, 2022Updated 3 years ago