0xcb / pyescryptLinks
Python bindings for yescrypt: memory-hard, NIST-compliant password hashing
☆13Updated last year
Alternatives and similar repositories for pyescrypt
Users that are interested in pyescrypt are comparing it to the libraries listed below
Sorting:
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆25Updated last month
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆16Updated 6 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- ARP Man-in-the-Middle tool☆29Updated 6 months ago
- Fuzz Network Traffic☆18Updated 5 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- A USB armory based USB sandbox☆21Updated 8 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆18Updated 4 years ago
- Decryption utility for PGP Whole Disk Encryption☆19Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Base64 Mutator☆13Updated 4 years ago
- ☆16Updated last month
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- ☆23Updated 9 months ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- Hash collisions and their exploitations☆9Updated 3 years ago
- A utility to decrypt and retrieve encrypted data (either cookies or login credentials) from Chromium SQLite databases.☆10Updated last year
- Extract, defang, resolve names and IPs from text☆23Updated last year
- Python CLI and module for CIRCL hash lookup☆14Updated 4 months ago
- Collection of tools for processing storage media images☆14Updated 5 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆27Updated 8 months ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Automatic generator of YARA modules based in protocol buffers☆16Updated 4 months ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- Still point in moving world.☆51Updated 2 years ago
- Monitor malware scanning services for your payloads☆11Updated 4 years ago