paulveillard / cybersecurity-applied-cryptographyLinks
A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.
☆10Updated 3 years ago
Alternatives and similar repositories for cybersecurity-applied-cryptography
Users that are interested in cybersecurity-applied-cryptography are comparing it to the libraries listed below
Sorting:
- ☆101Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆67Updated 5 months ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆22Updated 2 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆55Updated 3 years ago
- Script to manage and create local pentesting training virtual lab☆50Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆87Updated last year
- This is a repository for network security tools and technologies.☆101Updated 3 years ago
- Awesome Secure Coding☆19Updated 10 months ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆53Updated last week
- A summary of the most abbreviations I encountered so far☆29Updated 3 weeks ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆98Updated last year
- Challenge Python☆19Updated 2 years ago
- ☆85Updated 3 years ago
- Cybersecurity Notes☆166Updated last year
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆98Updated last year
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- List of some cybersecurity conferences☆58Updated 3 months ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated 3 months ago
- eLearnSecurity Certified Exploit Development☆105Updated 4 years ago
- ☆21Updated 3 years ago
- A simple pentest container equipped with common python pentest tools.☆42Updated last month
- An ongoing & curated collection of awesome software practices and remediation, libraries and frameworks,payloads and techniques, best gui…☆37Updated 2 years ago
- A collection of digital forensics tools for verification, investigations, diagnostics, software, libraries, learning tutorials, framework…☆31Updated 3 years ago
- List of questions, answers and random notes for security interviews☆70Updated 4 years ago
- Hi everyone,☆61Updated 2 years ago
- Reverse Engineering All-In-One. Quick refreshers into the world of reverse engineering.☆40Updated 4 years ago
- ☆202Updated 11 months ago
- A compiled list of tools for reconnaissance and footprinting☆156Updated last year
- A curated list of awesome malware analysis tools and resources☆121Updated 3 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆219Updated 10 months ago