A secure platform for storing of files using Hybrid Cryptography
☆52Mar 2, 2022Updated 4 years ago
Alternatives and similar repositories for Secure-File-Storage-Using-Hybrid-Cryptography
Users that are interested in Secure-File-Storage-Using-Hybrid-Cryptography are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A hybrid Encryption/Decryption Algorithm implementing both DES and RSA algorithm.☆19Oct 23, 2017Updated 8 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- Content Based Image Retrieval System Implemented Using Python, Flask And OpenCV.☆32Feb 15, 2023Updated 3 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- A set of 10 challenges for Forensics workshop, VIDYUT'19☆15Jul 23, 2020Updated 5 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆11Oct 29, 2023Updated 2 years ago
- Convert auditd logs to json format☆10Apr 3, 2019Updated 6 years ago
- Arp spoof detection tool☆26Jun 30, 2017Updated 8 years ago
- 🌐📊 Flutter web admin dashboard template, perfect for visualizing data!☆16Mar 17, 2023Updated 3 years ago
- A web experiment to see how well you can estimate a minute. Compare yourself against 140k+ attempts☆13Apr 12, 2025Updated 11 months ago
- This is a simple app that tracks the price of cryptocurrencies.☆15Jun 22, 2023Updated 2 years ago
- ☆14Jul 21, 2024Updated last year
- ☆12Aug 26, 2016Updated 9 years ago
- Write ups for DRDO CTF☆10Jan 13, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Utility to remove digital code signature from binary PE files in Windows.☆17Apr 25, 2021Updated 4 years ago
- This tool automates and facilitates an Differential fault analysis attack on AES 128 with a fault injected between the 2 last MixColumns☆13Nov 9, 2022Updated 3 years ago
- VM-Series templates for Google Cloud Platform☆11Jan 15, 2020Updated 6 years ago
- ☆19Jan 7, 2024Updated 2 years ago
- Python library created while solving the Matasano Cryptopals challenges☆17Jun 17, 2021Updated 4 years ago
- Shows current attendance and result☆15Apr 13, 2021Updated 4 years ago
- End-to-end image search engine based on the Deep learning techniques.☆49Jul 6, 2023Updated 2 years ago
- 🔍 Open Distro for Elasticsearch SQL CLI enables you to query your Elasticsearch instance from the command-line.☆13Nov 17, 2020Updated 5 years ago
- Java Games and Application with awesome source code and better algorithm☆27Jan 6, 2018Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- contains a bruteforcer wifi hacker an batch to exe converter contains a n verity of usefull tools☆27Jan 14, 2024Updated 2 years ago
- Algorithms Course Repo☆26Apr 23, 2025Updated 11 months ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Dec 2, 2025Updated 3 months ago
- ☆17Jun 13, 2017Updated 8 years ago
- Simple python script to evade antiviruses on fully patched and updated Windows environments using a py2exe.☆20Oct 24, 2022Updated 3 years ago
- Digital Forensics XML packages in Python☆18Jan 20, 2026Updated 2 months ago
- Draw quickly anywhere on your device. Written in Kotlin☆28Oct 2, 2022Updated 3 years ago
- Analyzes the results of more than 4.57 million chess games in the Chess960 variant.☆13May 11, 2020Updated 5 years ago
- A flutter package for showing a country, states, and cities. In addition it gives the possibility to select a list of favorites countries…☆22Nov 18, 2022Updated 3 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Simple Notes taking android app using Firebase☆14May 15, 2023Updated 2 years ago
- RSA is the algorithm used by modern computers to encrypt and decrypt messages. It is an asymmetric cryptographic algorithm. Asymmetric me…☆16Jul 4, 2018Updated 7 years ago
- This is a DIY project in which I control a relay module using ESP8266 via WiFi through BLynk. The relay module can activate or deactivate…☆18Oct 1, 2020Updated 5 years ago
- A tool to ease tasks on seedr.cc☆28Nov 13, 2022Updated 3 years ago
- Python exploit for vsftpd 2.3.4 - Backdoor Command Execution☆16Jan 8, 2023Updated 3 years ago
- ☆20Dec 13, 2022Updated 3 years ago
- Algorithms written in Python and Explained using Jupyter 📓 from the Cryptography 🔐 Book ~Forouzan.☆18Feb 20, 2022Updated 4 years ago