crypto101 / book
Crypto 101, the introductory book on cryptography.
☆2,996Updated last year
Related projects ⓘ
Alternatives and complementary repositories for book
- A curated list of resources for learning about application security☆6,312Updated 4 months ago
- Project Wycheproof tests crypto libraries against known attacks.☆2,784Updated 2 months ago
- A collected list of awesome security talks☆4,040Updated 3 years ago
- Useful IT policies☆4,892Updated 9 months ago
- A libre cross-platform disassembler.☆1,431Updated 5 years ago
- A collection of debugging stories. PRs welcome (sorry for the backlog) :-)☆3,763Updated 5 months ago
- Source for the little book about OS development☆2,228Updated last year
- A short tutorial about building Linux based operating systems.☆5,147Updated 5 months ago
- Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA…☆3,475Updated 5 months ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆1,795Updated 3 weeks ago
- HTML5/EPUB3 version of SICP☆4,353Updated last year
- SICP PDF with Texinfo and LaTeX source☆4,285Updated 4 months ago
- A list of command-line tools for manipulating structured text data☆6,979Updated 2 months ago
- A transparent and secure way to look up public keys.☆1,575Updated 3 years ago
- A curated list of awesome infosec courses and training resources.☆5,192Updated 8 months ago
- Bottom Up Computer Science☆1,486Updated last year
- like ~~grep~~ UBER, but for binaries☆1,711Updated last year
- List of crypto projects that might not suck☆423Updated last year
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,332Updated 7 months ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,227Updated 3 months ago
- A collection of resources for linux reverse engineering☆1,994Updated 2 years ago
- mal - Make a Lisp☆10,071Updated last week
- Great security list for fun and profit☆1,732Updated last year
- This project has been moved to:☆1,463Updated 3 years ago
- Guidelines for low-level cryptography software☆1,106Updated last year
- This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structu…☆1,242Updated 2 years ago
- A searchable, syncable, content-addressable notetaking system☆1,036Updated 7 years ago
- A curated list of cryptography resources and links.☆5,871Updated 3 weeks ago