robertdavidgraham / non-math-crypto
A non-math, but still technical, guide to cryptography
☆24Updated 4 years ago
Alternatives and similar repositories for non-math-crypto:
Users that are interested in non-math-crypto are comparing it to the libraries listed below
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Network white noise collector☆18Updated 9 years ago
- Parses DNS responses in a secure, rigorous manner☆22Updated 4 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- ☆18Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Summary and archives of leaked Vietnam TLD DNS data☆43Updated 7 years ago
- ☆13Updated 4 years ago
- ☆15Updated 8 years ago
- Phishing e-mail repository☆37Updated 4 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Popping boxes with Nmap☆18Updated 12 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 8 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago