quickbundle / hackingLinks
☆12Updated 9 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- ☆17Updated 11 years ago
- Malware visualization on earth map☆40Updated 10 years ago
- Using SGX to harden password hashing☆34Updated 9 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 6 years ago
- Detect snooper on your system!☆85Updated 8 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- aptoide app store APK download☆26Updated 10 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Updated 8 years ago
- EFF's Tracker Blocking Laboratory is an experimental project to test heuristic blocking of non-consensual online tracking. It's based on …☆11Updated 12 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 10 years ago
- Public resources NB shares☆18Updated 9 years ago
- free crypto audit☆31Updated 8 years ago
- ☆198Updated 9 years ago
- ☆16Updated 9 years ago
- ☆12Updated 9 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 4 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- Military-Grade Password Manager☆12Updated 9 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 6 years ago
- Parse HTTP Security Headers☆40Updated last year
- ☆24Updated 3 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 9 years ago