dchest / historic-password-hashes
Historic password hashing algorithms
☆18Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for historic-password-hashes
- advanced code generator for John the Ripper☆12Updated 6 years ago
- System tuning recommendations for running cryptographic applications☆23Updated 8 years ago
- NXP Security Controller (SCCv2) - Linux driver☆19Updated 9 months ago
- sign elf binaries with GPG☆17Updated 8 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 8 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20Updated 8 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- ☆12Updated 7 years ago
- Test Suite for John the Ripper☆24Updated 2 years ago
- ☆13Updated 7 years ago
- SSH Man In The Middle proxy with credentials interception, asciinema session replay, ...☆23Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago
- Simulates Attacks of AB16 on Argon2i☆11Updated 8 years ago
- Off-The-Record Messaging protocol implementation for Python☆13Updated 11 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated 2 months ago
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Updated 4 years ago
- Fuzzing compression libraries☆19Updated 8 years ago
- GNURadio GRC files, Arduino code and scripts for preforming attacks on iSmartAlarm systems.☆21Updated 7 years ago
- Python implementation of the Sphinx mix format. - Paper: http://www.cypherpunks.ca/~iang/pubs/Sphinx_Oakland09.pdf☆15Updated 5 years ago
- Mirror of freehaven's anonymous research bibliography☆13Updated 9 years ago
- Good-enough Hex Editor/Annotator☆24Updated 4 years ago
- A tool to help you understand TPM commands and responses.☆34Updated last month
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆27Updated 6 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆10Updated 9 years ago
- ☆17Updated 10 years ago
- ~/bin/☆14Updated last year
- Zero-trust SSH CA☆28Updated 2 months ago