gionanide / CryptographyLinks
Crypto projects in python, e.g. Attacks to Vigenere, RSA, Telnet Protocol, Hip Replacement , Vernam cipher, Crack Zip Files, Encryptions RC4, Steganography, Feistel cipher, Superincreasing Knapsac, Elliptic Curve Cryptography, Diffie Hellman & EDF.
☆20Updated 2 years ago
Alternatives and similar repositories for Cryptography
Users that are interested in Cryptography are comparing it to the libraries listed below
Sorting:
- Elliptic Curve Cryptography and Common Public Key Cryptography Implementations☆107Updated 10 months ago
- Hard-to-detect image steganography☆50Updated last year
- A list of covert channels and steganography/steganalysis resources (books, papers & tools)☆101Updated 3 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- Steganography in Twitter using retweets☆12Updated 3 years ago
- This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges☆79Updated 2 years ago
- Fresh malware samples caught in the wild daily from random places. 🎣☆19Updated 6 years ago
- A first look at browser-based Cryptojacking☆16Updated 7 years ago
- Lattice-Based Post-Quantum Authenticated Key Exchange☆20Updated 8 years ago
- A collection of malware samples.☆39Updated 8 years ago
- Linux kernel level keylogger that uses Twitter as a covert channel to get information of keystrokes and user data into the attacker using…☆11Updated 3 years ago
- ☆28Updated 5 years ago
- Writeups to Crypto Challenges in CTFs☆41Updated 7 years ago
- CTF problems for the practice of Beginners in Cyber Forensics.☆36Updated 2 years ago
- A repository that aims to provide tools for cryptography and cryptanalysis☆218Updated 5 years ago
- A large-scale database of malicious software images☆51Updated 4 years ago
- A web application which detects fake news using machine learning and natural language processing techniques.☆30Updated 4 years ago
- IP2Tor allows to determine whether an IP address is a Tor exit node.☆30Updated 5 years ago
- Rainbow table attack☆17Updated 10 years ago
- Temporary Email Service Within Terminal☆11Updated 5 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Updated 3 years ago
- Solutions for the Matasano Crypto Challenges☆24Updated 7 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Updated 6 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Updated 5 years ago
- Resources for our (extended) version of our IMC Crypto-Mining Malware paper☆33Updated 6 years ago
- This project has all the components which you can use to clone yourself over digital channel☆55Updated 5 years ago
- Information Security using Steganography over Cryptography☆14Updated last year
- A multi-layered and multi-tiered Machine Learning security solution, it supports always on detection system, Django REST framework used, …☆48Updated 2 years ago
- Th3g3ntl3man CTF Writeups☆22Updated 7 years ago
- An antivirus powered by machine learning.☆41Updated 8 years ago