An example of AES GCM encryption mode using Pycryptodome
☆26Aug 17, 2020Updated 5 years ago
Alternatives and similar repositories for AES-GCM-example
Users that are interested in AES-GCM-example are comparing it to the libraries listed below
Sorting:
- Collection of my slide decks, conference videos and research white papers☆27Sep 23, 2025Updated 5 months ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆28Updated this week
- Using unet and wgan to enhance resolution and remove watermark☆30May 27, 2019Updated 6 years ago
- ☆10Jul 27, 2018Updated 7 years ago
- Grouper Python Client Library☆10Apr 18, 2023Updated 2 years ago
- Python3 version of UC Berkeley's CS 188 Pacman Capture the Flag project☆10Mar 14, 2024Updated last year
- Developed with web2py and inspired by Agile methodology using Scrum and Kanban simplifying teamwork.☆21Feb 25, 2016Updated 10 years ago
- Indexador em Python que organiza torrents brasileiros em formato padronizado☆43Updated this week
- 💁 Counterfactual and Upgradable Self-Sovereign Identity for Ethereum, using Gnosis Safe☆15Sep 5, 2018Updated 7 years ago
- A simple python script to generate nested folders based on user input. The script will also name and place a template report document and…☆11Jun 19, 2025Updated 8 months ago
- A list of backdoor samples I find online.☆13Dec 16, 2019Updated 6 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- Mobile App Architecture Playground☆10Jan 31, 2017Updated 9 years ago
- tool to send packet using "gopacket".☆11Aug 11, 2017Updated 8 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)☆10Dec 8, 2022Updated 3 years ago
- ☆12Sep 6, 2020Updated 5 years ago
- Template dApp to start building with the Enigma Protocol☆12Dec 24, 2018Updated 7 years ago
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Jun 13, 2016Updated 9 years ago
- Deprecated version of Explorer☆11Mar 31, 2022Updated 3 years ago
- 从http://ggjd.cnstock.com/ 抓取股票的午间公告☆10Aug 1, 2016Updated 9 years ago
- Cyber Security Resources☆10Jan 25, 2024Updated 2 years ago
- Get random bytes from the TPM (tool + BCrypt RNG provider)☆17Nov 3, 2020Updated 5 years ago
- open hardware security device☆10Jan 16, 2018Updated 8 years ago
- ☆13May 13, 2015Updated 10 years ago
- Get a number of your tweets from the Twitter API.☆13May 1, 2022Updated 3 years ago
- TWRP device tree for ZTE Axon 7 (ailsa_ii)☆12Mar 7, 2022Updated 4 years ago
- PoC multi-layer protector for ELF32 x86 binaries☆12Feb 26, 2022Updated 4 years ago
- ATM security list☆13Aug 10, 2020Updated 5 years ago
- GT06 GPS Tracker Server☆12Dec 20, 2019Updated 6 years ago
- XMind to Latex is a tool that reads a XMind mind map and derives a structured latex document.☆13Dec 21, 2025Updated 2 months ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- L2E llama2.c on Commodore C-64☆18Feb 22, 2025Updated last year
- Code for "Message Scheduling for Performant, Many-Core Belief Propagation"☆12Oct 25, 2019Updated 6 years ago
- Automated setup of development environments and other miscellaneous scripts.☆12Mar 2, 2020Updated 6 years ago
- Node, Express, PostgreSQL, Vue 2 and Graphql CRUD Web App☆12Jun 19, 2025Updated 8 months ago
- Journey to learning frida android.☆11Apr 23, 2019Updated 6 years ago
- AWS CloudWatch Events Collector☆13Feb 3, 2026Updated last month