robertdavidgraham / non-math-cryptoLinks
A non-math, but still technical, guide to cryptography
☆24Updated 4 years ago
Alternatives and similar repositories for non-math-crypto
Users that are interested in non-math-crypto are comparing it to the libraries listed below
Sorting:
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- ☆18Updated 2 years ago
- Parses DNS responses in a secure, rigorous manner☆21Updated 4 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Updated 6 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Ruby API client for the Censys internet-wide network-scan search engine☆10Updated 9 months ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 7 years ago
- Phishing e-mail repository☆37Updated 5 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Phishing Toolkit☆20Updated 7 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated 2 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Python bindings for Yeti's API☆18Updated last year
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago