☆10Mar 31, 2024Updated last year
Alternatives and similar repositories for encryption
Users that are interested in encryption are comparing it to the libraries listed below
Sorting:
- ☆19Mar 9, 2022Updated 3 years ago
- ☆112Nov 24, 2025Updated 3 months ago
- C++ stealer (passwords, cookies, forms, cards, wallets)☆15Dec 6, 2022Updated 3 years ago
- ☆51Mar 29, 2022Updated 3 years ago
- Stock recommendation service, that selects winning stocks 89-92% of the time☆11Dec 15, 2023Updated 2 years ago
- ☆10May 19, 2016Updated 9 years ago
- Repository for slide decks of public talks I've given.☆14Apr 23, 2023Updated 2 years ago
- A cybersecurity guy's curated list of useful browser bookmarks☆15Mar 6, 2025Updated 11 months ago
- Code for the paper "Bag of features for voice anti-spoofing"☆13Jul 6, 2023Updated 2 years ago
- This program belongs to AlessandroZ.I fud it.You can use it without getting caught in antivirus programs.☆13Apr 30, 2020Updated 5 years ago
- Red Hat Certified System Administrator Notes☆18Jul 25, 2020Updated 5 years ago
- Using Powershell to automate the install of Active Directory☆21Dec 14, 2022Updated 3 years ago
- study guide for CNA☆15Feb 28, 2020Updated 6 years ago
- Script to draw an image onto r/place (https://www.reddit.com/r/place/)☆16Apr 5, 2022Updated 3 years ago
- Web interface and APIs for Assemblyline 4☆20Updated this week
- ☆21Aug 31, 2022Updated 3 years ago
- A script to compile an assets information and update SnipeIT inventory system.☆31Aug 16, 2022Updated 3 years ago
- Express middleware for generating an API based on bookshelf models.☆21Jan 6, 2017Updated 9 years ago
- Class materials for the Austin Front-End Engineering class☆23Jun 27, 2016Updated 9 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- SAMO: SPEAKER ATTRACTOR MULTI-CENTER ONE-CLASS LEARNING FOR VOICE ANTI-SPOOFING☆42Apr 5, 2023Updated 2 years ago
- A script to build either Blackarch, Kali linux or ParrotOS Docker container which has the ability to provide desktop environment access e…☆42Jan 12, 2022Updated 4 years ago
- تجربتي مع اختبار CompTIA Security+☆42Jul 10, 2022Updated 3 years ago
- Strumenti di Acquisizione e Analisi di copie Forensi☆170Aug 29, 2025Updated 6 months ago
- ☆35Apr 23, 2022Updated 3 years ago
- Strumenti per rilevare ed estrarre informazioni nascoste all'interno di file.☆44Apr 17, 2023Updated 2 years ago
- ☆35Jul 22, 2021Updated 4 years ago
- java for dummies learn java from start☆40Nov 17, 2021Updated 4 years ago
- Malware and malicious applications database☆38Jun 12, 2024Updated last year
- Scripts and tools accompanying HP Threat Research blog posts and reports.☆50Apr 10, 2024Updated last year
- CISSP Study Materials PDF and Web Copy for 2022☆46Apr 11, 2021Updated 4 years ago
- PoC for CVE-2022-1388_F5_BIG-IP☆58May 15, 2022Updated 3 years ago
- Token Authentication module for Django Rest Framework with different token configuration for API client.☆48May 3, 2023Updated 2 years ago
- ☆49Aug 16, 2016Updated 9 years ago
- Application Security pipelines☆51May 25, 2022Updated 3 years ago
- PoC for CVE-2022-21974 "Roaming Security Rights Management Services Remote Code Execution Vulnerability"☆60Feb 26, 2022Updated 4 years ago
- ☆63Apr 5, 2019Updated 6 years ago
- A Python library for handling TAXII Messages invoking TAXII Services.☆73Apr 21, 2021Updated 4 years ago
- Repository for SPEED SIEM Use Case Framework☆60May 2, 2020Updated 5 years ago