robertdavidgraham / non-math-crypto
A non-math, but still technical, guide to cryptography
☆24Updated 4 years ago
Alternatives and similar repositories for non-math-crypto:
Users that are interested in non-math-crypto are comparing it to the libraries listed below
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 4 years ago
- A collection of all the court filings in the case of Apple being forced to help the FBI unlock the San Bernadino shooter's phone, plus so…☆11Updated 9 years ago
- Identifies Bluetooth Low-energy devices☆16Updated 4 years ago
- Phishing Toolkit☆20Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Parses DNS responses in a secure, rigorous manner☆21Updated 4 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Format string exploit generation☆10Updated 9 years ago
- ☆18Updated last year
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 10 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Phishing e-mail repository☆37Updated 5 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- Rekall Forensics and Incident Response Framework with rVMI extensions☆33Updated 4 years ago
- first commit☆20Updated last year
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Ansible scripts to build an attack box☆22Updated 6 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 8 years ago
- ☆13Updated 4 years ago
- Proof of Concept for Netgear Routerlogin.com exploit☆17Updated 5 years ago
- Apache use after free bug infos / ASAN stack traces☆66Updated 6 years ago
- AYY LMAO☆21Updated 9 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago