0xcb / pyescrypt
Python bindings for yescrypt: memory-hard, NIST-compliant password hashing
☆11Updated last year
Alternatives and similar repositories for pyescrypt:
Users that are interested in pyescrypt are comparing it to the libraries listed below
- Fuzz Network Traffic☆18Updated 2 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆29Updated last year
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- advanced code generator for John the Ripper☆12Updated 6 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆14Updated last year
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Base64 Mutator☆12Updated 4 years ago
- ☆16Updated 7 months ago
- The Multiplatform Linux Sandbox☆15Updated last year
- ☆13Updated 6 months ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆41Updated 2 years ago
- THC "R U There" network discovery tool☆27Updated 4 years ago
- Given a string determine the possible hashing algorithms used to produce that string.☆18Updated 4 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆16Updated 6 years ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- Polyglot detector☆21Updated 11 months ago
- DFF (Digital Forensics Framework)☆10Updated 4 years ago
- Hash collisions and their exploitations☆9Updated 2 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆22Updated 2 years ago
- ☆16Updated 4 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Toolset to analyze disks encrypted with McAFee FDE technology☆17Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- ☆24Updated 10 months ago
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Updated 5 years ago
- ld_preload userland rootkit☆34Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago