Coursera Course Symmetric Cryptography 🔑 part of Introduction to Applied Cryptography Specialization.
☆17Sep 14, 2020Updated 5 years ago
Alternatives and similar repositories for symmetric-cryptography
Users that are interested in symmetric-cryptography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Coursera Course on Cryptography and Information Theory part of larger Applied Cryptography 🔐 Specialization by Univrsity of Colorado 🎓 …☆17Sep 17, 2020Updated 5 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 10 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- An issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component☆11Aug 5, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- This is an Active Directory Pentesting Lab created by me which includes attacks like IPV6 DNS takeover, Smb relay, unconstrained delegati…☆23Jan 23, 2024Updated 2 years ago
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- Exploit Proof-of-Concept code for XAMPP v3.3.0 — '.ini' Buffer Overflow (Unicode + SEH)☆14Nov 1, 2023Updated 2 years ago
- Analyzes AdminSDHolder permissions & compares with default baseline or a previous run, to detect potential backdoor/excessive persistent …☆16Apr 8, 2025Updated last year
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆12Aug 9, 2023Updated 2 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Java Collections Framework course at https://youtu.be/GdAon80-0KA☆29May 14, 2021Updated 4 years ago
- These are notes and code from my experience working through the UnderTheWire wargames.☆27Sep 28, 2020Updated 5 years ago
- An extension of the sigma standard to include security metrics.☆16May 18, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆11Aug 18, 2023Updated 2 years ago
- Unveiling Cyber Threats: From assets to Vulnerability Insights☆17Oct 22, 2024Updated last year
- BoltWire v6.03 vulnerable to "Improper Access Control"☆14Oct 31, 2023Updated 2 years ago
- A mechanism that trampoline hooks functions in x86/x64 systems.☆21Oct 9, 2024Updated last year
- ☆14Feb 7, 2023Updated 3 years ago
- Tools for Attacking Pleasant Password Server☆23Sep 19, 2023Updated 2 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆17Aug 24, 2023Updated 2 years ago
- A collection of 10 network security tools using Scapy for traffic analysis, penetration testing, and network manipulation. Ideal for cybe…☆17Oct 20, 2024Updated last year
- ☆22Jul 15, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Extension functionality for the NightHawk operator client☆27Oct 31, 2023Updated 2 years ago
- GBounty Profiles are customizable security test definitions used by the GBounty web scanner to identify vulnerabilities in web applicatio…☆25Mar 11, 2025Updated last year
- ☆15Feb 28, 2020Updated 6 years ago
- MCP server for using the REMnux malware analysis toolkit via AI assistants☆61Mar 31, 2026Updated last week
- Yet Another Memory Analyzer for malware detection☆24Aug 4, 2023Updated 2 years ago
- The official repository of ICSME'23 paper "Exploring Security Commits in Python"☆18Jul 12, 2023Updated 2 years ago
- 这是一个 XXE 漏洞检测工具(This is an XXE vulnerability detection tool)☆17Dec 10, 2024Updated last year
- PoC script for CVE-2023-20110 - Cisco Smart Software Manager On-Prem SQL Injection Vulnerability☆16Jul 16, 2023Updated 2 years ago
- Activation of Office 2019☆13Oct 13, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Mar 11, 2021Updated 5 years ago
- wsnet☆26Mar 4, 2026Updated last month
- Vulnerable Windows Server 2012 VM made for practicing certain Active Directory attacks.☆24Jun 13, 2023Updated 2 years ago
- ☆22Jan 29, 2025Updated last year
- ☆13Sep 25, 2022Updated 3 years ago
- HARpwn - HARToken Extraction and Sanitization Module; HARpwn is a PowerShell module designed to streamline the extraction and sanitizati…☆20Nov 3, 2023Updated 2 years ago
- A command line tool to search AttackerKB.☆54Jan 16, 2021Updated 5 years ago