aa-policy-validatorValidate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation
Stars: ✭ 42 (-83.91%)
PastebinMarkdownXSSXSS in pastebin.com and reddit.com via unsanitized markdown output
Stars: ✭ 84 (-67.82%)
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-90.42%)
juumla🦁 Juumla is a python tool created to identify Joomla version, scan for vulnerabilities and search for config or backup files.
Stars: ✭ 107 (-59%)
DcRatA simple remote tool in C#.
Stars: ✭ 709 (+171.65%)
JsshaA JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family (SHA-1, SHA-224/256/384/512, SHA3-224/256/384/512, SHAKE128/256, cSHAKE128/256, and KMAC128/256) with HMAC.
Stars: ✭ 2,089 (+700.38%)
cyphrHumane encryption
Stars: ✭ 91 (-65.13%)
Piv GoKeys and certificates for YubiKeys, written in Go
Stars: ✭ 172 (-34.1%)
volana🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-85.44%)
Pkcs11interopManaged .NET wrapper for unmanaged PKCS#11 libraries
Stars: ✭ 170 (-34.87%)
paperbackPaper backup generator suitable for long-term storage.
Stars: ✭ 517 (+98.08%)
FlashPaperOne-time encrypted password/secret sharing
Stars: ✭ 85 (-67.43%)
TIGMINTTIGMINT: OSINT (Open Source Intelligence) GUI software framework
Stars: ✭ 195 (-25.29%)
SolcryptoSolidity crypto libraries, ring signatures, proof of knowledge, packed signatures etc. with matching Python implementations for secp256k1 and (alt)BN-256
Stars: ✭ 170 (-34.87%)
Flutter-TutorialsRepo for Flutter tutorials on the Cheetah Coding YouTube Channel
Stars: ✭ 152 (-41.76%)
Pass WinmenuAn easy-to-use Windows interface for pass
Stars: ✭ 160 (-38.7%)
DDTTXDDTTX Tabletop Trainings
Stars: ✭ 22 (-91.57%)
Libsodium Jni(Android) Networking and Cryptography Library (NaCL) JNI binding. JNI is utilized for fastest access to native code. Accessible either in Android or Java application. Uses SWIG to generate Java JNI bindings. SWIG definitions are extensible to other languages.
Stars: ✭ 157 (-39.85%)
envkeygoEnvKey's official Go client library
Stars: ✭ 36 (-86.21%)
MemguardSecure software enclave for storage of sensitive information in memory.
Stars: ✭ 2,036 (+680.08%)
WaitForItEvents and time based iOS app scenarios made easy.
Stars: ✭ 26 (-90.04%)
SubtlePure-Rust traits and utilities for constant-time cryptographic implementations.
Stars: ✭ 157 (-39.85%)
virgil-sdk-netVirgil Core SDK allows developers to get up and running with Virgil Cards Service API quickly and add end-to-end security to their new or existing digital solutions to become HIPAA and GDPR compliant and more.
Stars: ✭ 16 (-93.87%)
Bot18Bot18 is a high-frequency cryptocurrency trading bot developed by Zenbot creator @carlos8f
Stars: ✭ 157 (-39.85%)
1earnffffffff0x 团队维护的安全知识框架,内容包括不仅限于 web安全、工控安全、取证、应急、蓝队设施部署、后渗透、Linux安全、各类靶机writup
Stars: ✭ 3,715 (+1323.37%)
interbitTo the end of servers
Stars: ✭ 23 (-91.19%)
Auth AdtAuthenticated Data Structures Generically
Stars: ✭ 150 (-42.53%)
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+9.96%)
Torus NodeTorus nodes run a Distributed Key Generation protocol amongst themselves that allows for the generation, storage and assignment of cryptographic keys
Stars: ✭ 148 (-43.3%)
Branca🔑 Secure alternative to JWT. Authenticated Encrypted API Tokens for Go.
Stars: ✭ 147 (-43.68%)
adalancheActive Directory ACL Visualizer and Explorer - who's really Domain Admin?
Stars: ✭ 862 (+230.27%)
CryptokernelA SDK for implementing blockchain-based digital currencies
Stars: ✭ 146 (-44.06%)
Wasm CryptoA WebAssembly (via AssemblyScript) set of cryptographic primitives for building authentication and key exchange protocols.
Stars: ✭ 146 (-44.06%)
Python-KeyloggerPython Tutorial - || Advanced Keylogger || Code Walk-through || Hacking/Info-Sec ||
Stars: ✭ 55 (-78.93%)
Dumb CryptoDumb, but easily verifiable implementations of crypto algorithms
Stars: ✭ 137 (-47.51%)
honeykuA Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).
Stars: ✭ 56 (-78.54%)
NoiseprotocolNoise Protocol Framework - Python 3 implementation
Stars: ✭ 142 (-45.59%)
sidh-rsSupersingular Isogeny Diffie-Hellman in Rust
Stars: ✭ 12 (-95.4%)
Crypto1 bsBitsliced Crypto-1 brute-forcer
Stars: ✭ 140 (-46.36%)
TIWAPTotally Insecure Web Application Project (TIWAP)
Stars: ✭ 137 (-47.51%)
TrussedModern Cryptographic Firmware
Stars: ✭ 140 (-46.36%)
Crypto RnnLearning the Enigma with Recurrent Neural Networks
Stars: ✭ 139 (-46.74%)
goverviewgoverview - Get an overview of the list of URLs
Stars: ✭ 93 (-64.37%)
Mstar Bin ToolScripts to manipulate Mstar firmware binaries (e.g. MstarUpgrade.bin, LetvUpgrade.bin etc)
Stars: ✭ 137 (-47.51%)
jwt-signature[READ ONLY] Signature component of the JWT Framework
Stars: ✭ 32 (-87.74%)
CircularDialogsAndroid dialog library to give user feedback about the common operations like Success, Warning and Errors.
Stars: ✭ 35 (-86.59%)
infinitreeScalable and encrypted embedded database with 3-tier caching
Stars: ✭ 80 (-69.35%)
NIST-to-TechAn open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-76.63%)
CrossMobileCreate native iOS, Android, Windows Phone and Desktop applications in Java. Write it once, and produce sophisticated multiplatform applications.
Stars: ✭ 48 (-81.61%)
emeEME (Encrypt-Mix-Encrypt) wide-block encryption for Go.
Stars: ✭ 30 (-88.51%)
userlessA client and server side solution for zero knowledge authentication, in Go
Stars: ✭ 15 (-94.25%)
tugareconPentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-45.59%)
github-watchmanMonitoring GitHub for sensitive data shared publicly
Stars: ✭ 60 (-77.01%)
diary-app🔐An End-To-End Encrypted Diary Web App
Stars: ✭ 83 (-68.2%)