Freely available cryptographic iconography
☆67Dec 23, 2016Updated 9 years ago
Alternatives and similar repositories for cryptonom-icon
Users that are interested in cryptonom-icon are comparing it to the libraries listed below
Sorting:
- A node.js setup to demonstrate FIDO Universal 2nd Factor (U2F) authentication☆12Oct 23, 2021Updated 4 years ago
- Another Remote Access Control software, written in Golang. It heavily relies on cryptography to avoid threat of botnet use/abuse by other…☆11Jan 12, 2017Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- BigBlueButton versions lower than 2.2.4 have a LFI vulnerability allowing access to sensitive files. 🚨☆14Apr 23, 2020Updated 5 years ago
- Certified Refurbished Private Key Depot☆12Oct 17, 2019Updated 6 years ago
- Kudelski Security's 2017 crypto challenge☆20Jul 6, 2017Updated 8 years ago
- ☆36Mar 2, 2022Updated 4 years ago
- The BGP Atlas Monitor☆16Jan 24, 2018Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Sep 13, 2017Updated 8 years ago
- A dead simple secret store service for anyone using AWS☆37Feb 22, 2019Updated 7 years ago
- Exploit Pack - One step ahead☆12Sep 9, 2013Updated 12 years ago
- IP whitelisting in Go☆21Jun 9, 2020Updated 5 years ago
- Setup DevTerm to be a cool non-GUI device☆14Jun 3, 2024Updated last year
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- Specification of a protocol to transmit APDU commands and responses over Bluetooth Low Energy☆17Dec 12, 2018Updated 7 years ago
- Userspace tool to create ext4 encrypted directories.☆52Feb 15, 2017Updated 9 years ago
- A reversible DER and BER pretty-printer.☆249Oct 28, 2025Updated 4 months ago
- Some code snapshot that can be used to craft your own tool/exploit☆12May 28, 2015Updated 10 years ago
- Open source implementation of the OpenPGP smart card version 2.0 on a java card.☆34Apr 28, 2015Updated 10 years ago
- ☆13May 13, 2015Updated 10 years ago
- Various things to share☆11Sep 22, 2018Updated 7 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Jul 31, 2015Updated 10 years ago
- Organization site☆11Sep 27, 2019Updated 6 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- Connector apps for Aragon Voting☆14Nov 18, 2020Updated 5 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ctypes bindings for libphash to robustly compare media files☆12Dec 28, 2022Updated 3 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Various stuff and tweaks I have around Obsidian☆12Jun 20, 2025Updated 9 months ago
- Simple Aragon App forwarder that requires a user to deposit fees before executing an action☆11Oct 26, 2020Updated 5 years ago
- Async RPC client for Ethereum☆15Oct 28, 2025Updated 4 months ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- hdb... hyperboria database? hype-debugger? housing and development board?☆19Oct 8, 2015Updated 10 years ago
- Symfony2 < 2.5.4 profiler exploit☆13Sep 30, 2015Updated 10 years ago
- API public documentation☆10Dec 17, 2018Updated 7 years ago
- Analysis of the evolution of Android permissions. This repository contains the results presented in the paper "Small Changes, Big Changes…☆29Apr 1, 2023Updated 2 years ago
- Open-source FIDO server, featuring the FIDO2 standard.☆22Apr 11, 2019Updated 6 years ago