epixoip / hmac-bcryptLinks
The hmac-bcrypt password hashing function
☆66Updated last year
Alternatives and similar repositories for hmac-bcrypt
Users that are interested in hmac-bcrypt are comparing it to the libraries listed below
Sorting:
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆103Updated last month
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- singe's grep - a fast grep using single-file parallelism☆47Updated 3 years ago
- ☆23Updated last year
- Source to www.draw.io☆98Updated 6 years ago
- egrets monitors egress☆46Updated 5 years ago
- Determine Who Can Log In to an SSH Server☆30Updated 7 months ago
- Zone files offering all types of resource records☆38Updated 6 months ago
- Tool to find common vulnerabilities in cryptographic public keys☆310Updated this week
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- A memorial site for Hackers and Infosec people who have passed☆135Updated last month
- rxtls is a hyper-optimized, per-core Certificate Transparency (CT) log processor built for one purpose: to extract and process 100,000+ X…☆55Updated last month
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Updated 6 years ago
- Kubernetes Unhinged Shell 😎☆46Updated 3 years ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆79Updated last week
- ☆99Updated last week
- ☆18Updated 4 years ago
- The TLS-Scanner Module from TLS-Attacker☆281Updated 4 months ago
- Fast syncronization across networks using speedy compression, lots of parallelization and fast hashmaps for keeping track of things inter…☆96Updated 5 months ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.☆36Updated 3 years ago
- ☆37Updated 4 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- Tool to examine the behaviour of setuid binaries under constrained limits.☆63Updated 4 years ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆63Updated 4 years ago
- Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support☆108Updated this week
- A CHaracter Aware Splitting Method for producing password candidates.☆43Updated 7 years ago
- Binary Protocol Differ☆117Updated 5 years ago
- A simple binary wrapper for DNS canarytokens.☆25Updated 3 years ago
- Parse greppable Nmap output as a tree☆14Updated 3 years ago
- A canary designed to minimize the impact from certain Ransomware actors☆102Updated 4 years ago