Minimal setup to trigger the xz backdoor
☆29Oct 19, 2024Updated last year
Alternatives and similar repositories for xz-min
Users that are interested in xz-min are comparing it to the libraries listed below
Sorting:
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆23Feb 28, 2025Updated last year
- ☆24Sep 12, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆12Feb 24, 2023Updated 3 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.☆17Aug 31, 2018Updated 7 years ago
- Pentium II microcode (dis)assembler and (de)scrambler☆21Feb 11, 2021Updated 5 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- ☆16Sep 26, 2016Updated 9 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- ☆48Nov 4, 2022Updated 3 years ago
- Python code for doing k-Best or List decoding with the Viterbi algorithm☆18May 4, 2017Updated 8 years ago
- Module for parsing radiotap headers in python☆22May 6, 2023Updated 2 years ago
- A very very fast VHDL implementation of the WPA2 encryption algorithm.☆26Jul 15, 2017Updated 8 years ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆18Jan 17, 2026Updated last month
- ☆24Apr 2, 2024Updated last year
- Tool for decrypting and encrypting Pentium II microcode patches.☆29May 21, 2025Updated 9 months ago
- Determine which CPU architecture is used in a binary file.☆125Mar 7, 2025Updated 11 months ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- Modern exploit in Golang for ancient Nagra / Dish Network cards.☆33Feb 15, 2025Updated last year
- Repository for application-layer loop DoS☆33Mar 20, 2024Updated last year
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆36Dec 15, 2025Updated 2 months ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Vandalize old emails. Like an NFT that's easy to prove ownership of.☆34Jul 20, 2023Updated 2 years ago
- A bignum library for C.☆33Jul 9, 2024Updated last year
- Source code & scripts for experimental characterization and real-system demonstration of RowPress, a widespread read disturbance phenomen…☆37Jan 11, 2024Updated 2 years ago
- Binary Exploitation Phrack CTF Challenge☆70Aug 21, 2025Updated 6 months ago