robertdavidgraham / non-math-cryptoLinks
A non-math, but still technical, guide to cryptography
☆24Updated 5 years ago
Alternatives and similar repositories for non-math-crypto
Users that are interested in non-math-crypto are comparing it to the libraries listed below
Sorting:
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- Parses DNS responses in a secure, rigorous manner☆21Updated 5 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- ☆12Updated 7 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Updated 7 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆23Updated 6 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- suspect is a simple bash triage tool☆18Updated 7 years ago
- Frontend for MalShare.com☆17Updated last month
- A Passive DNS backend and collector☆31Updated 3 years ago
- Single-threaded epoll-based concurrent bulk whois client☆31Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago
- A small script to automate project folder management and basic tool output☆34Updated 5 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- Provides access to libhashcat☆30Updated last year
- Simplified NAT Slipstream server and client☆22Updated 4 years ago
- Crawlium: A crawling platform based on Chrome (Chromium) browser to get a deeper look into the ecosystem of content inclusion on the Web.☆53Updated last year
- An ARP Poisoning Defender script☆43Updated 7 years ago
- AYY LMAO☆22Updated 9 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Updated 7 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Updated 4 years ago
- ld_preload userland rootkit☆35Updated 4 years ago
- Web application that lets you test if your domain is vulnerable to email spoofing☆38Updated 6 years ago