kholia / fvde2johnLinks
See README.txt for usage instructions. Use http://www.openwall.com/lists/john-users/ for support.
☆16Updated 6 years ago
Alternatives and similar repositories for fvde2john
Users that are interested in fvde2john are comparing it to the libraries listed below
Sorting:
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- Hash collisions and their exploitations☆9Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- ☆16Updated last month
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- Project Gutenberg Australia word lists☆14Updated 3 years ago
- THC "R U There" network discovery tool☆28Updated 5 years ago
- The Multiplatform Linux Sandbox☆15Updated last year
- Alpine hostapd-mana based RADIUS server☆10Updated last year
- Michelangelo REanimator bootkit and REcon 2023 talk slides/materials☆30Updated last year
- Haschcat Rules processor☆14Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Parser for Windows PowerShell script block logs☆13Updated 5 months ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- ☆26Updated last year
- A password list optimized for use on Android devices.☆11Updated 2 years ago
- A USB armory based USB sandbox☆20Updated 7 years ago
- Fuzz Network Traffic☆18Updated 5 months ago
- iTLB multihit PoC☆41Updated last year
- A custom SentinelOne USB scanner.☆18Updated 3 years ago
- Decoders for 7ev3n ransomware☆15Updated 8 years ago
- Helper scripts to automate the extraction of YARA rules from XProtectRemediators☆20Updated last year
- Antivirus for Linux operating system☆9Updated 8 years ago
- ☆35Updated 6 years ago
- wordlists for password cracking☆28Updated 2 years ago
- ☆22Updated 4 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- yet another hidden LKM hunter☆23Updated last year
- Miscellaneous analysis tools☆27Updated 10 years ago