Backfuzzprotocol fuzzing toolkit
Stars: ✭ 106 (-36.53%)
FluttercryptouiFlutter representation of a Crypto app Concept
Stars: ✭ 158 (-5.39%)
Tensorflow MtcnnC++ and python Inference only for MTCNN face detector on Tensorflow. Based on davidsandberg's facenet project:
Stars: ✭ 106 (-36.53%)
V86x86 virtualization in your browser, recompiling x86 to wasm on the fly
Stars: ✭ 12,765 (+7543.71%)
JebscriptsA set of JEB Python/Java scripts for reverse engineering Android obfuscated code
Stars: ✭ 100 (-40.12%)
Auth AdtAuthenticated Data Structures Generically
Stars: ✭ 150 (-10.18%)
PracticalmalwarelabsKeep track of the labs from the book "Practical Malware Analysis"
Stars: ✭ 130 (-22.16%)
LibraryCollection of papers in the field of distributed systems, game theory, cryptography, cryptoeconomics, zero knowledge
Stars: ✭ 100 (-40.12%)
Cargo Flasha cargo extension for programming microcontrollers
Stars: ✭ 134 (-19.76%)
Ctfsome experience in CTFs
Stars: ✭ 165 (-1.2%)
Hacker ContainerContainer with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-37.13%)
Tiny KeccakAn implementation of Keccak derived functions specified in FIPS-202, SP800-185 and KangarooTwelve
Stars: ✭ 134 (-19.76%)
JesfsJo's Embedded Serial File System (for Standard Serial NOR-Flash)
Stars: ✭ 104 (-37.72%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-20.96%)
ApktoolA tool for reverse engineering Android apk files
Stars: ✭ 12,978 (+7671.26%)
ChurpDecentralize your secrets!
Stars: ✭ 100 (-40.12%)
Gdb StaticPublic repository of static GDB and GDBServer
Stars: ✭ 103 (-38.32%)
Ipfs RpiIPFS installer for the Raspberry Pi and other ARM-based devices.
Stars: ✭ 130 (-22.16%)
M4ngl3m3Common password pattern generator using strings list
Stars: ✭ 103 (-38.32%)
Validity90Reverse engineering of Validity/Synaptics 138a:0090, 138a:0094, 138a:0097, 06cb:0081, 06cb:009a fingerprint readers protocol
Stars: ✭ 1,807 (+982.04%)
Ecency MobileEcency Mobile - reimagined social blogging, contribute and get rewarded (for Android and iOS)
Stars: ✭ 103 (-38.32%)
AutocryptConvenient End-to-End Encryption for E-Mail
Stars: ✭ 161 (-3.59%)
SimplednscryptA simple management tool for dnscrypt-proxy
Stars: ✭ 1,901 (+1038.32%)
LibchaosAdvanced library for randomization, hashing and statistical analysis (devoted to chaos machines). 🔬
Stars: ✭ 1,619 (+869.46%)
RoutersploitExploitation Framework for Embedded Devices
Stars: ✭ 9,866 (+5807.78%)
Embedded Ai.benchbenchmark for embededded-ai deep learning inference engines, such as NCNN / TNN / MNN / TensorFlow Lite etc.
Stars: ✭ 131 (-21.56%)
EasycryptAndroid cryptography library with SecureRandom patches.
Stars: ✭ 102 (-38.92%)
DistormxThe ultimate hooking library
Stars: ✭ 146 (-12.57%)
Bc JavaBouncy Castle Java Distribution (Mirror)
Stars: ✭ 1,379 (+725.75%)
AsmtkAssembler toolkit based on AsmJit
Stars: ✭ 131 (-21.56%)
FccFedjmike's C Compiler
Stars: ✭ 101 (-39.52%)
Practical Cryptography For Developers BookPractical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
Stars: ✭ 2,400 (+1337.13%)
IdbutilLibrary and tool for reading IDApro databases.
Stars: ✭ 100 (-40.12%)
Hacl StarHACL*, a formally verified cryptographic library written in F*
Stars: ✭ 1,360 (+714.37%)
Merkle TreeMerkle Trees and Merkle Inclusion Proofs
Stars: ✭ 130 (-22.16%)
Flare IdaIDA Pro utilities from FLARE team
Stars: ✭ 1,374 (+722.75%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-11.38%)
Hs JoseHaskell JOSE and JWT library
Stars: ✭ 100 (-40.12%)
KurukshetraKurukshetra - A framework for teaching secure coding by means of interactive problem solving.
Stars: ✭ 131 (-21.56%)
Anno1800 Mod LoaderThe one and only mod loader for Anno 1800, supports loading of unpacked RDA files, XML merging and Python mods.
Stars: ✭ 161 (-3.59%)
MudMultipath UDP library
Stars: ✭ 100 (-40.12%)
Jsonpjsonp is a Burp Extension which attempts to reveal JSONP functionality behind JSON endpoints. This could help reveal cross-site script inclusion vulnerabilities or aid in bypassing content security policies.
Stars: ✭ 131 (-21.56%)
NgrevTool for reverse engineering of Angular applications
Stars: ✭ 1,368 (+719.16%)
Torus NodeTorus nodes run a Distributed Key Generation protocol amongst themselves that allows for the generation, storage and assignment of cryptographic keys
Stars: ✭ 148 (-11.38%)
Esteem SurferEcency desktop formerly known as Esteem Surfer - reimagined desktop social wallet, contribute and get rewarded (for Windows, Mac, Linux)
Stars: ✭ 100 (-40.12%)
Python HoneypotOWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (-4.19%)
Tvm MaliOptimizing Mobile Deep Learning on ARM GPU with TVM
Stars: ✭ 156 (-6.59%)
Libsodium DocGitbook documentation for libsodium
Stars: ✭ 129 (-22.75%)
Sm64toolsCollection of tools for Super Mario 64 ROM hacking
Stars: ✭ 129 (-22.75%)
JavascriptA repository for All algorithms implemented in Javascript (for educational purposes only)
Stars: ✭ 16,117 (+9550.9%)
SubtlePure-Rust traits and utilities for constant-time cryptographic implementations.
Stars: ✭ 157 (-5.99%)
Droidreversereverse engineering tools for android(android 逆向工程工具集)
Stars: ✭ 1,839 (+1001.2%)
JevoisJeVois smart machine vision framework
Stars: ✭ 128 (-23.35%)