dchest / historic-password-hashesLinks
Historic password hashing algorithms
☆17Updated 4 years ago
Alternatives and similar repositories for historic-password-hashes
Users that are interested in historic-password-hashes are comparing it to the libraries listed below
Sorting:
- Web of trust grapher☆38Updated 2 weeks ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- AVX2 Chacha implementation☆16Updated 11 years ago
- The BIOS for the PC Engines apu system board (based on the open source system BIOS CoreBoot)☆13Updated 10 years ago
- sign elf binaries with GPG☆18Updated 8 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- Fun with the TLS handshake☆31Updated 10 years ago
- Load a .so from network and execute it inside a seccomp sandbox☆19Updated 9 years ago
- advanced code generator for John the Ripper☆13Updated 7 years ago
- ☆13Updated 7 years ago
- Fuzzing compression libraries☆19Updated 9 years ago
- Reference implementations of the GIMLI permutation☆15Updated 7 years ago
- Open tools for side-channel analysis and related techniques. Currently, this repository contains: 1) A near-field EM probe amplifier circ…☆36Updated 10 years ago
- An overlay that verifies signed ELF binaries☆9Updated 10 years ago
- ☆15Updated 4 years ago
- USB armory - boot loader☆37Updated 2 months ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 8 years ago
- Heap analysis tooling for mempool☆13Updated 2 years ago
- A tiny tool to learn the assembly code☆11Updated 8 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆12Updated 10 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- Tooling and Scripts for Hacking Super Street Fighter II Cabinets☆18Updated 3 years ago
- Print core memory of a given a process ID (linux specific)☆11Updated 7 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24Updated 14 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- I2P bindings for Twisted.☆15Updated 2 years ago
- Dump GNU IFUNC implementation offsets from libc☆11Updated 2 years ago
- Simulates Attacks of AB16 on Argon2i☆11Updated 8 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year