dchest / historic-password-hashes
Historic password hashing algorithms
☆18Updated 4 years ago
Alternatives and similar repositories for historic-password-hashes:
Users that are interested in historic-password-hashes are comparing it to the libraries listed below
- AVX2 Chacha implementation☆16Updated 11 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- Database of Internet Facing TN3270 Mainframes☆23Updated 9 years ago
- advanced code generator for John the Ripper☆12Updated 6 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- ☆24Updated 9 years ago
- Web of trust grapher☆39Updated 10 months ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- A proxy for allowing a public IP address to host a service actually provided by a hidden backend.☆15Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆11Updated 10 months ago
- Linux kernel module to run a userspace application when a magic packet arrives☆13Updated 6 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆10Updated 9 years ago
- ☆13Updated 7 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 7 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- E4's C2 server☆19Updated 4 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- Go support for parsing, compiling, and installing Chromium OS Seccomp-BPF policy files.☆11Updated 8 years ago
- A simple C library for entropy measurement of byte streams and other data.☆14Updated 5 years ago
- TN3270 MitM proxy and so much more☆13Updated 6 years ago
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆17Updated 3 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆18Updated 9 years ago
- A Python implementation of JOSE☆14Updated 5 years ago
- ☆15Updated 8 years ago