quickbundle / hackingLinks
☆12Updated 9 years ago
Alternatives and similar repositories for hacking
Users that are interested in hacking are comparing it to the libraries listed below
Sorting:
- Results of a recent FOIA for NIST documents related to the design of Dual EC DRBG. Via EFF and Rep. Grayson's office. See README for deta…☆24Updated 10 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 5 years ago
- ☆17Updated 11 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆14Updated 5 years ago
- DeCryKe is a technique to transform almost any cryptographic algorithm into deniable-one, it is a decry of Russia's anti-terrorism law (a…☆23Updated 7 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Updated 8 years ago
- A privacy-preserving digital version of punch cards used in store loyalty programs☆11Updated 4 years ago
- ☆12Updated 8 years ago
- Repository for Tor's DNS-related issues.☆17Updated 8 years ago
- free crypto audit☆31Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- End-to-End encrypted Tor2Web gateway☆38Updated 5 years ago
- A List of InfoSec Resources☆10Updated 11 years ago
- Timing Attack on TLS' ECDSA signature☆46Updated 10 years ago
- Wisecracker is a high performance distributed cryptanalysis framework.☆49Updated 8 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 9 years ago
- Auditing Applied Cryptography☆11Updated 6 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- Differential fuzzing for elliptic curves☆24Updated 2 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- Military-Grade Password Manager☆12Updated 8 years ago
- 🛰A bash script to check if you have a gateway that could get you somewhere nice.☆15Updated 5 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆29Updated 11 years ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Updated 7 years ago
- A collection of steganography tools.☆15Updated 5 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Xanity PHP RAT leak For Researchers☆22Updated 9 years ago
- DES cracking using brute force algorithm and CUDA☆25Updated 8 years ago