paulveillard / cybersecurity-applied-cryptographyLinks
A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.
☆11Updated 3 years ago
Alternatives and similar repositories for cybersecurity-applied-cryptography
Users that are interested in cybersecurity-applied-cryptography are comparing it to the libraries listed below
Sorting:
- ☆103Updated 4 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆56Updated 3 years ago
- Challenge Python☆19Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated this week
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Updated 3 years ago
- Script to manage and create local pentesting training virtual lab☆50Updated 5 years ago
- Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.☆40Updated 5 years ago
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- Resources for Browser Security Research☆53Updated 3 years ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆49Updated 2 years ago
- The most complete code auditing platform with thousands of real-world challenges☆135Updated 7 months ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆22Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 3 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, awesome resources and cool stuff about ARM and Wind…☆51Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Minimalist resources to learn about pentesting smart contracts, from lab to practice, ctf and some recommendations.☆19Updated 3 years ago
- Yet another awesome fuzzers list☆15Updated last year
- External Playbooks for Public Access☆41Updated 11 months ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 2 months ago
- Hacking: The Art of Exploitation 2nd Edition, by Jon Erickson☆21Updated 5 years ago
- Gonna share my writeups and resources here☆71Updated last year
- Notes, research, and methodologies for becoming a better hacker. Knowledge should be free.☆69Updated last week
- This is a repository for network security tools and technologies.☆101Updated 3 years ago
- ReGen is a utility tool simplifying Regex creation by selecting values from logs or text. It enhances efficiency for digital forensics, d…☆22Updated 2 years ago
- 📚A curated list of product security resources.☆22Updated 7 months ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 8 months ago
- This repository contains information on the CVEs I found.☆52Updated last year
- ☆25Updated 2 years ago
- Code repository for "Machine Learning For Red Team Hackers".☆41Updated 5 years ago