mheistermann / HashPump-partialhashView external linksLinks
A tool to exploit the hash length extension attack in various hashing algorithms
☆10Apr 14, 2014Updated 11 years ago
Alternatives and similar repositories for HashPump-partialhash
Users that are interested in HashPump-partialhash are comparing it to the libraries listed below
Sorting:
- ☆35Aug 29, 2012Updated 13 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Query CSV files with SQL.☆11Oct 15, 2018Updated 7 years ago
- Examples for using the dedupe library☆10Feb 22, 2016Updated 9 years ago
- ☆33Dec 26, 2025Updated last month
- Parsec Go client☆12Oct 25, 2022Updated 3 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- ☆10Jul 3, 2021Updated 4 years ago
- learn the basics of gulp☆10Aug 17, 2015Updated 10 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- ResetRyder - Open Source Brute Force Password Reset Tool☆17Mar 10, 2025Updated 11 months ago
- PEDA - Python Exploit Development Assistance for GDB☆13Jul 13, 2024Updated last year
- Volatility plugins☆12Feb 19, 2015Updated 10 years ago
- A replacement of RWeka's NGramTokenizer (no rJava dependency!)☆10Mar 10, 2016Updated 9 years ago
- Demo code for real-time logging processing on GCP☆15May 1, 2024Updated last year
- Summit Route End Point Protection - Server code☆11Apr 10, 2016Updated 9 years ago
- A simple demo of running a scheduled PHP process on Heroku☆18Feb 8, 2024Updated 2 years ago
- Pythia server (prototype) implementation☆13Nov 8, 2018Updated 7 years ago
- PoC☆12Apr 7, 2025Updated 10 months ago
- ☆10Sep 20, 2015Updated 10 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- Tracking events, CfPs, abstracts, slides, and all other even related things☆22Oct 4, 2019Updated 6 years ago
- TLS SNIp - Rule based proxy for routing/filtering TLS/SSL protocols.☆13May 3, 2017Updated 8 years ago
- The Gruqg's old hacking harness, from times of old before github☆14Mar 10, 2018Updated 7 years ago
- ☆15Jun 15, 2021Updated 4 years ago
- ☆12Apr 7, 2021Updated 4 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆17Sep 11, 2012Updated 13 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- Proof of Concept - Local discharging of third party caveats☆14Nov 27, 2017Updated 8 years ago
- hashkill password recovery tool☆198Feb 4, 2014Updated 12 years ago
- A Julia module (and command line tool) for calculating Cyclic Redundancy Checksums (CRCs)☆14Jan 4, 2023Updated 3 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Luna surface manager, a surface manager for webOS☆15Mar 26, 2025Updated 10 months ago