HxnDev / Password-Cracker-using-Brute-Force-AlgorithmLinks
This was our Final Project for Distributed Computing. In this we had to create a distributed system that will use the Brute Force Algorithm to crack a password from the etc/shadows file of Ubuntu as all the passwords are stored there. We used OpenMP and MPICH for this implementation.
☆12Updated 4 years ago
Alternatives and similar repositories for Password-Cracker-using-Brute-Force-Algorithm
Users that are interested in Password-Cracker-using-Brute-Force-Algorithm are comparing it to the libraries listed below
Sorting:
- ☆13Updated 2 weeks ago
- my ctf chals☆11Updated 3 months ago
- A MapReduce program to conduct sentiment analysis of a keyword from a list of comments.☆11Updated 4 years ago
- ☆22Updated 7 months ago
- A Sage interface for FGb (Gröbner basis computations)☆39Updated last year
- ☆34Updated 2 years ago
- ☆35Updated 2 years ago
- Fake news detection using Naïve Bayes in Python along with confusion matrix calculated using sklearn.☆10Updated 4 years ago
- Practical Implementation of the Maurer Reduction☆10Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Updated last year
- Final Year Project in Computer Vision that detects and reports traffic violations for safety purposes.☆41Updated 2 years ago
- Graphical Password Authentication System. This is used to increase the protection/security of a website. Our system is divided into furth…☆21Updated 3 years ago
- Repo for collecting part of my public CTF challenges☆41Updated last year
- ☆44Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Updated 2 years ago
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Updated 5 years ago
- A tool to estimate the difficulty of solving the syndrome decoding problem.☆17Updated 2 years ago
- Implementation of cryptographic attacks. Mainly reproduction of recent cryptographic papers.☆15Updated 10 months ago
- sdevkota007 / Graphical-Password-Authentication-Using-Persuasive-Cued-Clickpoints-With-File-Encryption☆17Updated 8 years ago
- Some writeups for some CTFs☆17Updated last year
- Functions for solving linear inequalities in integers☆56Updated 2 months ago
- Solving linear systems over GF(2) by manipulating bitvectors☆58Updated 6 months ago
- ☆14Updated 4 years ago
- ☆58Updated last month
- Prime backdooring procedure to allow fast factorization of semiprimes☆24Updated 3 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆94Updated 4 years ago
- ☆14Updated 5 years ago
- rkm0959 implements stuff☆44Updated 3 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Updated 4 years ago
- An implementation of Dumer's algorithm for Information Set Decoding.☆14Updated last year