robertdavidgraham / non-math-crypto
A non-math, but still technical, guide to cryptography
☆24Updated 4 years ago
Alternatives and similar repositories for non-math-crypto:
Users that are interested in non-math-crypto are comparing it to the libraries listed below
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 8 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Updated 6 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- Parses DNS responses in a secure, rigorous manner☆22Updated 4 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Gather information on Wiki contributions from IP ranges☆24Updated 7 years ago
- Detect Phishing fetching Certificate Transparency Logs☆20Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- ☆18Updated last year
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- A lightweight/secure honeypot using Lua scripts.☆23Updated 4 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 10 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- Test Suite for John the Ripper☆25Updated 3 years ago
- dev level ;-)☆10Updated 6 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- ☆13Updated 4 years ago
- Docker configs and build scripts.☆22Updated 10 years ago
- A Passive DNS backend and collector☆31Updated 2 years ago
- Set of Python scripts to perform SecRules language evaluation on a given http request.☆13Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆10Updated 9 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 8 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago