A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.
☆12Feb 4, 2022Updated 4 years ago
Alternatives and similar repositories for cybersecurity-applied-cryptography
Users that are interested in cybersecurity-applied-cryptography are comparing it to the libraries listed below
Sorting:
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆25Dec 28, 2022Updated 3 years ago
- An ongoing collection of awesome software, API libraries, checlists, best guidelines and resources and most important security countermea…☆14Nov 15, 2022Updated 3 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆19Feb 29, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆13Mar 25, 2023Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆18Oct 27, 2023Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jun 12, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆20Feb 25, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆21Feb 24, 2024Updated 2 years ago
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆18Dec 13, 2023Updated 2 years ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about SSL / TLS☆23Jun 24, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆27Jul 6, 2024Updated last year
- A collection of awesome software, libraries, documents, books, resources and cool stuff about cryptography in Cybersecurity.☆24May 24, 2025Updated 9 months ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about iOS Security…☆23Jan 6, 2024Updated 2 years ago
- A collection of digital forensics tools for verification, investigations, diagnostics, software, libraries, learning tutorials, framework…☆33Aug 26, 2022Updated 3 years ago
- An ongoing collection of awesome ethical hacking tools, software, libraries, learning tutorials, frameworks, academic and practical resou…☆40Feb 24, 2023Updated 3 years ago
- Sporta is a dynamic app designed for sports enthusiasts who want to connect 🤝, compete 🏆, and play 🏀🎾⚽ with others.☆10Apr 24, 2025Updated 10 months ago
- A simple, reliable and reasonably fast network capture analyzer.☆26Updated this week
- Opensource repository for DVID V2☆16Jun 3, 2025Updated 9 months ago
- 9front drawterm client with Audio for macOS☆10Apr 14, 2020Updated 5 years ago
- ☆11Oct 13, 2025Updated 4 months ago
- This repo includes all my codings, analytics and documentation for my AWS DeepRacer Competition☆11Oct 4, 2023Updated 2 years ago
- A low-cost remote vital signs monitor for home patients☆12Feb 19, 2026Updated 2 weeks ago
- This contains 100 days of the notes which i have learned with the internship.☆18Dec 1, 2024Updated last year
- Generatrum Linguarum, a conlang word generator library☆11Mar 28, 2023Updated 2 years ago
- Programmers Editor that grows with you☆12Jan 16, 2025Updated last year
- List web account manager (WAM) accounts added to the current profile☆22Dec 11, 2025Updated 2 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- My code and notes for "From Day Zero to Zero Day", a book on vulnerability research by Eugene Lim.☆30Nov 10, 2025Updated 3 months ago
- My mpv.net configuration files☆12Jul 10, 2022Updated 3 years ago
- an awesome list of honeypot resources☆10Jul 14, 2017Updated 8 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆49Dec 19, 2022Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, website…☆14Aug 23, 2022Updated 3 years ago
- Here I will add Addons for Iris micro by me and other users.