cryptography using python
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size1.8 GB
- Uploaded BySource1337
- Downloads281
- Last checkedMay. 19th '21
- Date uploadedMay. 16th '21
- Seeders 27
- Leechers21
Infohash : 67303EE383EA3F4F4C0A270987335D4BA8071073
Quote:
We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without “Them”, you and we won’t be here having this conversation. Think about it! ☮️ Peace.✌️
Code:
Requirements
Passion to learn
Basic knowledge about Python
Passion to learn
Basic knowledge about Python
Files:
Cryptography using Python 4. Cipher Decryption Program- 10. Learning the Substitution Cipher.vtt (0.0 KB)
- 1. Decryption of Transposition Cipher.mp4 (47.8 MB)
- 1. Decryption of Transposition Cipher.vtt (7.0 KB)
- 2. Detecting English Programmatically .vtt (9.2 KB)
- 2. Detecting English Programmatically.mp4 (57.6 MB)
- 3. Output of Dictionary List .vtt (2.9 KB)
- 3. Output of Dictionary List.mp4 (32.1 MB)
- 4. The Multiplicative Cipher .vtt (4.9 KB)
- 4. The Multiplicative Cipher.mp4 (27.8 MB)
- 5. Creating Cryptomath Module.mp4 (19.7 MB)
- 5. Creating Cryptomath Module.vtt (3.8 KB)
- 6. Affine Cipher Encryption.mp4 (81.4 MB)
- 6. Affine Cipher Encryption.vtt (9.4 KB)
- 7. Understanding the Decrypting Functionality.mp4 (44.5 MB)
- 7. Understanding the Decrypting Functionality.vtt (4.2 KB)
- 8. Hacking the Affine Cipher.mp4 (70.2 MB)
- 8. Hacking the Affine Cipher.vtt (8.5 KB)
- 9. Modifying and Hacking Affline.mp4 (31.8 MB)
- 9. Modifying and Hacking Affline.vtt (2.5 KB)
- 10. Learning the Substitution Cipher.mp4 (39.4 MB)
- 11. Implementing Substitution Cipher .vtt (5.6 KB)
- 11. Implementing Substitution Cipher.mp4 (51.7 MB)
- 12. Functions of Random Key .vtt (4.8 KB)
- 12. Functions of Random Key.mp4 (41.1 MB)
- 13. Runnig Code for Subsitution Cipher.mp4 (18.2 MB)
- 13. Runnig Code for Subsitution Cipher.vtt (2.2 KB)
- 14. Hacking the Substitution Cipher.mp4 (82.0 MB)
- 14. Hacking the Substitution Cipher.vtt (10.3 KB)
- 4. Symmetric and Asymmetric Cryptography [ ].mp4 (105.4 MB)
- 1. Cracking Passwords using Python [ ].mp4 (72.3 MB)
- 1. Cracking Passwords using Python [ ].vtt (8.0 KB)
- 2. Understanding Cryptography Plugin [ ].mp4 (30.8 MB)
- 2. Understanding Cryptography Plugin [ ].vtt (4.7 KB)
- 3. Learning the Pycrypto Plugin [ ].mp4 (33.9 MB)
- 3. Learning the Pycrypto Plugin [ ].vtt (4.7 KB)
- 4. Symmetric and Asymmetric Cryptography [ ].vtt (14.3 KB)
- 5. Understanding Primary Numbers Calculations [ ].mp4 (36.4 MB)
- 5. Understanding Primary Numbers Calculations [ ].vtt (4.3 KB)
- 6. Rabin Miller Algorithm [ ].mp4 (60.3 MB)
- 6. Rabin Miller Algorithm [ ].vtt (7.1 KB)
- 7. Public Key Cryptography [ ].mp4 (34.3 MB)
- 7. Public Key Cryptography [ ].vtt (9.3 KB)
- 8. Concept of RSA Algorithm [ ].mp4 (36.6 MB)
- 8. Concept of RSA Algorithm [ ].vtt (8.8 KB)
- 6 Simple Memory Techniques - All coder use.html (0.1 KB)
- 1. Introduction to Cryptography using Python.mp4 (4.0 MB)
- 1. Introduction to Cryptography using Python.vtt (1.9 KB)
- 1. Understanding the Process of Cryptography [ zerodaylab.us ].vtt (6.2 KB)
- 1. Understanding the Process of Cryptography.mp4 (20.2 MB)
- 2. Purpose of Python as a Tool.mp4 (27.3 MB)
- 2. Purpose of Python as a Tools .vtt (7.7 KB)
- 3. Algorithm on Reverse Cipher .vtt (7.6 KB)
- 3. Algorithm on Reverse Cipher.mp4 (35.1 MB)
- 1. Understanding Ceaser Cipher .vtt (7.4 KB)
- 1. Understanding Ceaser Cipher.mp4 (31.9 MB)
- 2. Algorithm on Pyperclip .vtt (5.5 KB)
- 2. Algorithm on Pyperclip.mp4 (33.6 MB)
- 3. Concept of Brute Force Attack .vtt (5.6 KB)
- 3. Concept of Brute Force Attack.mp4 (27.7 MB)
- 4. Functions of Transposition Cipher .vtt (4.1 KB)
- 4. Functions of Transposition Cipher.mp4 (17.7 MB)
- 5. Transposition Cipher Encryption Program .vtt (5.3 KB)
- 5. Transposition Cipher Encryption Program.mp4 (32.0 MB)
- 1. Concept of Vernam Cipher.mp4 (20.0 MB)
- 1. Concept of Vernam Cipher.vtt (3.4 KB)
- 2. Understanding the Implementation of Vernam Cipher.mp4 (41.0 MB)
- 2. Understanding the Implementation of Vernam Cipher.vtt (8.1 KB)
- 3. Implementation of Vignere Cipher .vtt (9.2 KB)
- 3. Implementation of Vignere Cipher.mp4 (80.0 MB)
- 4. Hacking the Vignere Cipher.mp4 (68.6 MB)
- 4. Hacking the Vignere Cipher.vtt (7.7 KB)
- 5. Base64 for Encoding and Decoding .vtt (5.8 KB)
- 5. Base64 for Encoding and Decoding.mp4 (33.8 MB)
- 6. Understanding MD5 and SHA Hashes .vtt (10.5 KB)
- 6. Understanding MD5 and SHA Hashes.mp4 (66.0 MB)
- 7. The XOR Type of Encryption .vtt (5.0 KB)
- 7. The XOR Type of Encryption.mp4 (37.8 MB)
- 1. Implementation of making RSA Keys [ ].mp4 (43.1 MB)
- 1. Implementation of making RSA Keys [ ].vtt (4.5 KB)
- 2. Returning the Private Key for Execution [ ].mp4 (54.5 MB)
- 2. Returning the Private Key for Execution [ ].vtt (5.4 KB)
- 1. Creating RSA Algorithm Implementation [ ].mp4 (40.3 MB)
- 1. Creating RSA Algorithm Implementation [ ].vtt (5.3 KB)
- 2. RSA Algorithm Implementation [ ].mp4 (48.7 MB)
- 2. RSA Algorithm Implementation [ ].vtt (5.6 KB)
- Linux Tails Operating System.html (0.1 KB)
- Seagate Expansion Desktop 10TB External Hard Drive HDD - USB 3.0.html (0.1 KB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.moeking.me:6969/announce
- http://tracker-cdn.moeking.me:2095/announce
- udp://wassermann.online:6969/announce
- udp://vibe.community:6969/announce
- udp://valakas.rollo.dnsabr.com:2710/announce
- udp://udp-tracker.shittyurl.org:6969/announce
- udp://tracker1.bt.moack.co.kr:80/announce
- udp://tracker0.ufibox.com:6969/announce
- udp://tracker.zerobytes.xyz:1337/announce
- udp://tracker.zemoj.com:6969/announce
- udp://tracker.v6speed.org:6969/announce
- udp://tracker.uw0.xyz:6969/announce