Statistics for topic cryptography
RepositoryStats tracks 560,267 Github repositories, of these 1,009 are tagged with the cryptography topic. The most common primary language for repositories using this topic is Rust (159). Other languages include: Python (136), C (93), Go (92), C++ (80), JavaScript (71), TypeScript (55), Java (51), C# (30), HTML (17)
Stargazers over time for topic cryptography
Most starred repositories for topic cryptography (view more)
Trending repositories for topic cryptography (view more)
Bywise is an enterprise-grade permissioned Distributed Ledger Technology (DLT), Blockchain for developing solutions and applications. Its modular and versatile design suits a wide range of industry us...
An encrypted file system written in Rust that is mounted with FUSE on Linux. It can be used to create encrypted directories
Bywise is an enterprise-grade permissioned Distributed Ledger Technology (DLT), Blockchain for developing solutions and applications. Its modular and versatile design suits a wide range of industry us...
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
Multi-platform transparent client-side encryption of your files in the cloud
A powerful obfuscator for JavaScript and Node.js
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Anonymous MiniApp Messenger Powered By E2E Encryption (AES + RSA)
This Repository is a collection of different ethical hacking tools and malware's for penetration testing and research purpose written in python, ruby, rust, c++, go and c.
🎵 Official source code and writeups for SekaiCTF 2024!
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Algorithms and Data Structures implemented in JavaScript for beginners, following best practices.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
零知识证明入门教程。Comprehensive Zero-Knowledge Proofs Tutorial. #zk #WIP
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Decentralized Secrets Management Engine powered by threshold cryptography and proxy re-encryption
Privacy-first, end-to-end encrypted Mail, Pages, Drive, and Calendar.