multiple password 'asher using Python’s hashlib
☆15Mar 24, 2021Updated 5 years ago
Alternatives and similar repositories for masher
Users that are interested in masher are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Subdomain finder☆10Mar 13, 2025Updated last year
- VHostChecker takes a csv list of targets in the form of domain,ip,port and runs 4 seperate connection checks to get a quick sense of how …☆33Sep 14, 2023Updated 2 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 6 years ago
- Collection of tools to interact with Intigriti website☆17Aug 10, 2024Updated last year
- Pure Java implementation of Ed25519☆21Mar 3, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A powerful Burp Suite extension that automatically detects JavaScript URLs from HTTP traffic, scans them using TruffleHog for secrets det…☆31Oct 23, 2025Updated 5 months ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- eBPF-based programmable firewall, intended for use in Go backends☆26Jan 26, 2026Updated 2 months ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Jan 15, 2021Updated 5 years ago
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Aug 16, 2022Updated 3 years ago
- ☆13May 29, 2020Updated 5 years ago
- Docker project to have an emulated android environment with automatic SSL/TLS certificates with Nginx using Lua☆12Dec 22, 2020Updated 5 years ago
- A low-level cryptographic library for point, group, field, and scalar operations on a curve isomorphic to the twisted Edwards curve defin…☆13Feb 16, 2022Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- A prototype implementation of CertLedger☆11Apr 11, 2019Updated 7 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 8 months ago
- Dump paths & pages from Next.js Manifest☆15Mar 19, 2024Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Mar 10, 2023Updated 3 years ago
- ☆38Aug 27, 2022Updated 3 years ago
- A command-line application to generate random user agent strings.☆17Mar 20, 2020Updated 6 years ago
- A PHP wrapper template to execute PowerShell payloads☆11Apr 2, 2021Updated 5 years ago
- ☆19Jul 13, 2020Updated 5 years ago
- Runtime enforcement of software supply chain capabilities in Go☆19Nov 12, 2025Updated 5 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A tool which allows HackerOne researchers to download their reports into a local, indexed, and searchable repository☆19Sep 29, 2022Updated 3 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- ☆18Nov 4, 2021Updated 4 years ago
- OpenPGP.js wrapper for Proton web clients.☆46Updated this week
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 9 months ago
- XOR crypt/decrypt using C#☆12Sep 30, 2020Updated 5 years ago
- A boilerplate for the freeCodeCamp curriculum referenced in 'Data Protection with BCrypt'.☆23Jul 28, 2024Updated last year
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- Some vulnerability research slides that I made☆12Jan 5, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆11Aug 2, 2016Updated 9 years ago
- Credential and sensitive information harvester for kubernetes environments.☆11Mar 2, 2021Updated 5 years ago
- Find world writable directories that contain a .exe or .dll file☆13Aug 31, 2021Updated 4 years ago
- The reminder app☆12Dec 25, 2024Updated last year
- Simple PoCs for utilizing Windows syscalls in Go☆16Jan 13, 2021Updated 5 years ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- docker env for ios research on a mac host☆28Jun 12, 2025Updated 10 months ago