felipec / xz-minView external linksLinks
Minimal setup to trigger the xz backdoor
☆29Oct 19, 2024Updated last year
Alternatives and similar repositories for xz-min
Users that are interested in xz-min are comparing it to the libraries listed below
Sorting:
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆22Feb 28, 2025Updated 11 months ago
- ☆23Sep 12, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts …☆13Oct 27, 2024Updated last year
- ☆12Feb 24, 2023Updated 2 years ago
- ☆16Aug 11, 2020Updated 5 years ago
- ☆14Jul 9, 2024Updated last year
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- Test Suite for John the Ripper☆25Dec 28, 2025Updated last month
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆12Jan 6, 2022Updated 4 years ago
- Pcaps for PeddleCheap and implant communication + script for interpreting and decrypting pcaps.☆17Nov 29, 2017Updated 8 years ago
- Homographs: brutefind homographs within a font☆19Apr 21, 2017Updated 8 years ago
- Pentium II microcode (dis)assembler and (de)scrambler☆22Feb 11, 2021Updated 5 years ago
- Project Gutenberg Australia word lists☆15Dec 30, 2021Updated 4 years ago
- Universal BIOS Recovery console for x86 PCs☆47May 10, 2024Updated last year
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆35Jan 17, 2013Updated 13 years ago
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Nov 25, 2019Updated 6 years ago
- Data related to the SANS Internet Storm Center☆13Sep 12, 2025Updated 5 months ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- KeyTrap (DNSSEC)☆44Feb 18, 2024Updated last year
- PoC for the Veeam Recovery Orchestrator Authentication CVE-2024-29855☆20Jun 17, 2024Updated last year
- ☆48Nov 4, 2022Updated 3 years ago
- Python code for doing k-Best or List decoding with the Viterbi algorithm☆18May 4, 2017Updated 8 years ago
- Pairwise GCD of RSA keys using CUDA☆17Feb 13, 2014Updated 12 years ago
- A very very fast VHDL implementation of the WPA2 encryption algorithm.☆26Jul 15, 2017Updated 8 years ago
- Module for parsing radiotap headers in python☆22May 6, 2023Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating s…☆18Jan 17, 2026Updated 3 weeks ago
- Tool for decrypting and encrypting Pentium II microcode patches.☆29May 21, 2025Updated 8 months ago
- Determine which CPU architecture is used in a binary file.☆125Mar 7, 2025Updated 11 months ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 3 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- ☆30Feb 2, 2026Updated last week
- Modern exploit in Golang for ancient Nagra / Dish Network cards.☆33Feb 15, 2025Updated 11 months ago
- Armory Drive - USB encrypted drive with mobile unlock over BLE☆79Updated this week
- Checks SSL/TLS certificates for potential malicious connections by detecting and blocking certificates used by botnet command and control…☆36Dec 15, 2025Updated last month
- Repository for application-layer loop DoS☆33Mar 20, 2024Updated last year
- Reviews of shim☆81Nov 10, 2025Updated 3 months ago