robertdavidgraham / non-math-crypto
A non-math, but still technical, guide to cryptography
☆24Updated 4 years ago
Alternatives and similar repositories for non-math-crypto:
Users that are interested in non-math-crypto are comparing it to the libraries listed below
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 8 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- Parses DNS responses in a secure, rigorous manner☆22Updated 4 years ago
- ☆18Updated last year
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆14Updated 2 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 6 years ago
- Phishing Toolkit☆20Updated 7 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Honeypot for router backdoor (TCP 32764)☆18Updated 11 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- dev level ;-)☆10Updated 6 years ago
- tamper resistant audit log☆18Updated 6 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Updated 6 years ago
- ☆13Updated 4 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- A scan of all .gov.uk sites for the most common security headers or lack of☆15Updated 4 years ago
- Ruby API client for the Censys internet-wide network-scan search engine☆9Updated 5 months ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago