lrusso96 / Cryptography
Utils for Cryptography class (1047622)
☆13Updated 2 years ago
Alternatives and similar repositories for Cryptography:
Users that are interested in Cryptography are comparing it to the libraries listed below
- Notes for the Cryptography course at Sapienza☆11Updated 4 years ago
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆22Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 3 months ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆20Updated 3 months ago
- Most common AWS S3 bucket names.☆27Updated 4 years ago
- ☆10Updated last year
- Wireless Pentest☆18Updated 6 years ago
- Target practice for ffuf☆61Updated 3 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 2 years ago
- Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances befo…☆14Updated 3 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Updated 6 years ago
- Sniper. Passive Secrets Hunting.🚬☆12Updated 2 years ago
- Curated lists of InfoSec on Twitter. Find out who's awesome to follow!☆90Updated 3 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆27Updated 6 months ago
- ☆21Updated 7 years ago
- ☆24Updated 2 weeks ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- 📙 User documentation for Caido☆25Updated this week
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆27Updated 2 years ago
- Mnemonic Cryptography☆17Updated 2 years ago
- A miscellany of thoughts.☆43Updated 10 months ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker☆22Updated 3 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Updated 2 years ago
- recon-ng modules for Censys☆36Updated last year
- A collection of my adventures through hackthebox.eu☆32Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆40Updated 4 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- Install and upgrade projectdiscovery tools☆10Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago