Free online resources to learn Cryptography.
β35Jun 13, 2015Updated 10 years ago
Alternatives and similar repositories for cryptography-resources
Users that are interested in cryptography-resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- π« List of awesome things for NodeSchool peopleβ13Mar 12, 2017Updated 9 years ago
- A C#-implemented malware that dynamically modifies its own hash upon each execution to evade detection.β17Feb 3, 2025Updated last year
- Static Feature Extraction & Selection (used in conjunction with the MASTIFF framework)β16Oct 19, 2016Updated 9 years ago
- Very WIP taint analysis for DynamoRIO (ARM)β21Apr 10, 2018Updated 7 years ago
- Exploiting Jackson deserialization vulnerability with 3 gadgetsβ10May 3, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Journey to learning frida android.β11Apr 23, 2019Updated 6 years ago
- Spring Boot Web with Hessianβ11Jul 2, 2014Updated 11 years ago
- All the free ebooks I've found online about hacking and such. Everyone should have access to these.....β14Nov 30, 2018Updated 7 years ago
- jackson-databind-exploitβ13Mar 22, 2019Updated 7 years ago
- Example AIDL service and clientβ11Nov 30, 2021Updated 4 years ago
- All Cryptography Algorithms are implemented in C.β13Mar 28, 2021Updated 4 years ago
- tiktok tools | scrapping | automationβ31Nov 10, 2025Updated 4 months ago
- Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable containerβ10Dec 16, 2017Updated 8 years ago
- Various tools, trainers and utilities created by Code Breaker during 1992-1995.β28May 29, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Send packets to a RADIUS server and show replyβ18Mar 21, 2015Updated 11 years ago
- Dissecting and Defeating Ransomware's Evasion Tactics Defcon 32β17Aug 9, 2024Updated last year
- (HotMobile'24) Salted Inference: Enhancing Privacy while Maintaining Efficiency of Split Inference in Mobile Computingβ17Jan 22, 2024Updated 2 years ago
- An authorized remote user with access or knowledge of the standard encryption key can gain access and decrypt the FortiOS backup files anβ¦β25Dec 19, 2023Updated 2 years ago
- Portable C Compiler (CVS mirror)β12Apr 9, 2012Updated 13 years ago
- Over the net fuzzing of QUIC servers or clients.β23Nov 21, 2025Updated 4 months ago
- LevelDB Viewer is a command-line tool designed for developers and data engineers to explore and interact with LevelDB databases.β31Aug 23, 2024Updated last year
- Assembly/Shellcodeβ14Oct 28, 2014Updated 11 years ago
- PoC Reverse Text segment ELF File infectorβ14Feb 28, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting β’ AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Check for HTTP Security Headersβ14Aug 17, 2015Updated 10 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitationβ15Feb 23, 2018Updated 8 years ago
- Windows login backdoor diagnostic toolβ11Apr 2, 2017Updated 8 years ago
- A simple 2-field fuzzer for the telnet protocolβ11Apr 4, 2017Updated 8 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Scriptβ12Aug 2, 2013Updated 12 years ago
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.β¦β12Jul 18, 2016Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)β10Apr 25, 2016Updated 9 years ago
- Comment rebasing for IDA Proβ27Apr 6, 2020Updated 5 years ago
- The theme for typora.β13Apr 12, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- C implementation of the BlaBla20 cipherβ10Jan 1, 2026Updated 2 months ago
- XSS payloads for edge casesβ34Nov 13, 2018Updated 7 years ago
- Disables app launch watchdog timeoutsβ28Oct 2, 2021Updated 4 years ago
- β35Dec 20, 2020Updated 5 years ago
- β26Nov 9, 2021Updated 4 years ago
- Python utility for parsing Maui AssemblyStore blob fileβ37Apr 14, 2025Updated 11 months ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.β13Oct 17, 2017Updated 8 years ago