Explore 30 curated tools and resources
Want your tool featured here?
Get maximum visibility with pinned placement
OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
OpenFHE is an open-source library implementing post-quantum Fully Homomorphic Encryption schemes with simplified APIs and cross-platform support.
Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.
Zama's fhEVM Coprocessor is an open-source tool for developing applications using Fully Homomorphic Encryption, enabling privacy-preserving computations in various domains.
Microsoft SEAL is a homomorphic encryption library that allows computations on encrypted data without decryption, supporting integer and approximate real number arithmetic.
Microsoft SEAL is a homomorphic encryption library that allows computations on encrypted data without decryption, supporting integer and approximate real number arithmetic.
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
A PHP library for secure data encryption with easy-to-use API.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
WireGuard is a fast, simple, and secure VPN that uses cutting-edge cryptography, designed for ease of use and performance.
A deep dive into the Ledger connect-kit compromise decryption process.
A deep dive into the Ledger connect-kit compromise decryption process.
The Update Framework (TUF) provides a cryptographic framework for securing software update systems through offline content signing and verification mechanisms.
The Update Framework (TUF) provides a cryptographic framework for securing software update systems through offline content signing and verification mechanisms.
Showcasing bad cryptography and discussing flawed crypto design.
Clevis is a pluggable framework for automated decryption.
Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Using high-quality entropy sources for CSPRNG seeding is crucial for security.
Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.
Microsoft Azure's dedicated HSM for secure key management and cryptographic operations.
A set of 48 practical programming exercises in cryptography and application security
A set of 48 practical programming exercises in cryptography and application security
A tool for xor analysis to guess key length and key based on most frequent characters.
A tool for xor analysis to guess key length and key based on most frequent characters.
A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.
A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.
A web application designed to be 'Xtremely Vulnerable' for security enthusiasts to learn application security.
A web application designed to be 'Xtremely Vulnerable' for security enthusiasts to learn application security.
A comprehensive guide for implementing best practices in cybersecurity across various systems.
A comprehensive guide for implementing best practices in cybersecurity across various systems.
Introductory book about cryptography with instructions for building and translating.
Introductory book about cryptography with instructions for building and translating.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Crt.sh is a website that allows users to search for SSL/TLS certificates of a targeted domain, providing transparency into certificate logs.
Themis provides strong, usable cryptography for busy people.
A tool for breaking crypto and identifying weak cryptosystems, with a humorous name and a separate library called Cryptanalib.
A tool for breaking crypto and identifying weak cryptosystems, with a humorous name and a separate library called Cryptanalib.
A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.
A practical security handbook for .NET developers covering essential security controls, cryptographic functions, and secure coding practices.
A Capture The Flag (CTF) platform for testing computer security skills
A Capture The Flag (CTF) platform for testing computer security skills
Interactive challenges demonstrating attacks on real-world cryptography.
Interactive challenges demonstrating attacks on real-world cryptography.
A reference cheat sheet documenting vulnerabilities in SSL/TLS protocol versions and cipher suites for security assessment purposes.
A reference cheat sheet documenting vulnerabilities in SSL/TLS protocol versions and cipher suites for security assessment purposes.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.
Calculates RSA parameters and generates RSA private keys in DER or PEM format.
A comprehensive server cryptographic protocol analyzer with API and CLI interface.
A comprehensive server cryptographic protocol analyzer with API and CLI interface.
Curated list of acronyms and terms related to cyber security landscape with explanations beyond buzzwords.
Curated list of acronyms and terms related to cyber security landscape with explanations beyond buzzwords.
Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.
Utilize the kernel's CSPRNG for generating crypto keys instead of userspace CSPRNGs to avoid randomness failures.
Validate baseline cybersecurity skills with CompTIA Security+ certification.
Validate baseline cybersecurity skills with CompTIA Security+ certification.