robertdavidgraham / non-math-cryptoLinks
A non-math, but still technical, guide to cryptography
☆24Updated 4 years ago
Alternatives and similar repositories for non-math-crypto
Users that are interested in non-math-crypto are comparing it to the libraries listed below
Sorting:
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Parses DNS responses in a secure, rigorous manner☆21Updated 4 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆62Updated 7 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Ruby API client for the Censys internet-wide network-scan search engine☆10Updated 10 months ago
- Repository for the OWASP/WASC Distributed Web Honeypots Project -☆31Updated 10 years ago
- Tips to protect your personal and company data☆28Updated 5 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Test Suite for John the Ripper☆24Updated 3 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆24Updated 10 years ago
- Perl library for SHODAN☆17Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- A Passive DNS backend and collector☆31Updated 3 years ago
- ☆12Updated 7 years ago
- quotes i like.☆15Updated 5 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Updated 6 years ago