A non-math, but still technical, guide to cryptography
☆24Jul 24, 2020Updated 5 years ago
Alternatives and similar repositories for non-math-crypto
Users that are interested in non-math-crypto are comparing it to the libraries listed below
Sorting:
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- ☆12Nov 9, 2017Updated 8 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆24Nov 26, 2018Updated 7 years ago
- Sample programs demonstrating how to program in C using the Sockets API.☆39Nov 16, 2024Updated last year
- A password list optimized for use on Android devices.☆11Jul 2, 2022Updated 3 years ago
- A bunch of library code that can easily be included in new/prototype projects with few (usually zero) dependencies, even on themselves.☆12Jul 26, 2020Updated 5 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- ☆13Sep 30, 2020Updated 5 years ago
- CoreFollowUp phishing attack on macOS☆15Mar 15, 2022Updated 3 years ago
- The Monty Hall problem, in JavaScript☆13Oct 1, 2017Updated 8 years ago
- On-chain program that manages user quotes on Phoenix☆18Feb 4, 2026Updated 3 weeks ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- A simple implementation of an 'echo' (port 7) server using epoll (Linux), kqueue (FreeBSD), and IOCompletionPorts (Windows).☆14Nov 19, 2018Updated 7 years ago
- ☆15Sep 30, 2022Updated 3 years ago
- Discusses how to verify DKIM signatures in old emails, namely one of the Hunter Biden emails in the news☆102Oct 17, 2022Updated 3 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Oct 27, 2016Updated 9 years ago
- iknowthis Linux SystemCall Fuzzer☆20Apr 18, 2019Updated 6 years ago
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- Manage Your Large Team of Consultants☆11Sep 18, 2025Updated 5 months ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Jul 26, 2019Updated 6 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- Zone transfers for rwhois☆20Feb 27, 2019Updated 7 years ago
- Rapid7 Labs operates as the division of Rapid7 focused on threat research. It is renowned for providing comprehensive threat intelligence…☆77Dec 15, 2025Updated 2 months ago
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- Parse Microsoft shim databases☆32Jan 8, 2025Updated last year
- VDA Labs scripts for the GHIDRA reverse engineering toolset☆29Mar 8, 2019Updated 6 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Handy scripts to speed up malware analysis☆34Oct 3, 2023Updated 2 years ago
- Python library for parsing AccessData AD1 images☆33Jun 1, 2023Updated 2 years ago
- Run commands with hidden console.☆31Jan 24, 2021Updated 5 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- A Frida script to bypass SSL pinning in Instagram 157.0 and later (iOS)☆11Sep 20, 2020Updated 5 years ago
- Techniques that i have used to evade anti-virus during pen tests.☆13May 29, 2018Updated 7 years ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- Spreadsheet Differ☆86Jul 4, 2020Updated 5 years ago