robertdavidgraham / non-math-cryptoLinks
A non-math, but still technical, guide to cryptography
☆24Updated 5 years ago
Alternatives and similar repositories for non-math-crypto
Users that are interested in non-math-crypto are comparing it to the libraries listed below
Sorting:
- Identifies Bluetooth Low-energy devices☆16Updated 5 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Updated 5 years ago
- Recording default/backdoor passwords from IoT devices I come across☆38Updated 9 years ago
- Parses DNS responses in a secure, rigorous manner☆22Updated 5 years ago
- A continuation of my 'ferret' project that extracts useful information from networks.☆23Updated 11 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Updated 7 years ago
- ☆12Updated 8 years ago
- Phishing Toolkit☆19Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Simple examples of integrating the Lua scripting language into C programs.☆24Updated 7 years ago
- suspect is a simple bash triage tool☆19Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Decoders for 7ev3n ransomware☆17Updated 9 years ago
- Passive DHCP fingerprinting implementation☆51Updated 9 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- A Passive DNS backend and collector☆33Updated 3 years ago
- Phishing e-mail repository☆36Updated 5 years ago
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 4 years ago
- quotes i like.☆16Updated 6 years ago
- A lightweight/secure honeypot using Lua scripts.☆26Updated 4 years ago
- Extract, defang, resolve names and IPs from text☆23Updated 2 years ago
- Tool to create and test shellcodes from custom assembly sources (with some encoding options)☆34Updated 7 years ago
- A DFIR tool to extract cryptocoin addresses and other indicators of compromise from binaries.☆56Updated 2 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- Create Suricata and Snort DNS signatures given a single domain or list of domains in a file.☆18Updated 8 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆57Updated 8 years ago
- Investigation data from two reports around the Blue Coat networking kit.☆17Updated 11 years ago
- Cryptographic Dataset Generation & Modelling Framework☆41Updated 5 years ago
- A packet-sniffer for 10gig networks that writes to compressed files. I created this because☆27Updated 8 years ago