Security

Tools useful for security, either offensive or defensive


Government

Cryptology

Hiding information

Ciphers

Symmetric Ciphers

Asymmetric Ciphers

Signatures and User auth

Copy protection

Misc

Math for Crypto


Reconnaissance

Malware

See malware

Common attack vectors

Try setting the HTTP Host header value to internal-ip:80 where internal ip is the ip address of a device inside of the target network

index.wiki