A tool to exploit the hash length extension attack in various hashing algorithms
☆17Sep 11, 2012Updated 13 years ago
Alternatives and similar repositories for HashPump
Users that are interested in HashPump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 哈希长度扩展攻击利用脚本,免去了hashpump需要编译的烦恼☆48Mar 17, 2024Updated 2 years ago
- ☆53Dec 8, 2025Updated 3 months ago
- 基于 PyQt5 的 Nuclei 漏洞扫描图形化工具,支持 POC 管理、FOFA/Hunter/Shodan 资产搜索、AI 辅助分析、漏洞报告生成等功能☆42Feb 28, 2026Updated 3 weeks ago
- Small container runtime for threat detection☆14Apr 13, 2025Updated 11 months ago
- 基于 Go 的终端风格在线聊天工具,仅单可执行文件,开箱即用. Go based terminal-style chat room.☆12Jun 2, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆10Jul 3, 2021Updated 4 years ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- 东方隐侠团队出品,代码审计skill☆74Feb 25, 2026Updated last month
- cryptocrack 是一个用Python编写的密码自动破解框架,在basecrack的基础上进行功能完善,期望解决CTF中Crypto部分题型☆14Jan 6, 2023Updated 3 years ago
- ☆11Dec 26, 2022Updated 3 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 一个专注于 Java Web 特性、配置和 Trick 的安全谜题集合☆121Dec 24, 2025Updated 3 months ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- 基于多种策略, 对已有 JAR 包中的全限定类名进行变换, 无限生成高度相似的虚假类名☆18Jul 30, 2025Updated 7 months ago
- Github repo from YouTube tutorial about customizing Airgeddon's Captive Portal template.☆14Aug 29, 2023Updated 2 years ago
- a raspberry pi zero w based hacking tool that installs a reverse shell on the target pc (running windows) which runs at startup using p4w…☆10Apr 12, 2021Updated 4 years ago
- 应急响应工具&文档☆16May 27, 2024Updated last year
- Network and IP Tools For Attack and Hacking Burtforce☆13Aug 19, 2022Updated 3 years ago
- 从CTF比赛平台批量下载附件。A tool for downloading attachments in bulk from CTF events on platforms. [计划重新设计 Redesign planned]☆15Mar 13, 2026Updated last week
- Move Vulnerability Database☆19Nov 18, 2025Updated 4 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A repository dedicated to tracking ransomware families based on leaked builders.☆22Apr 17, 2024Updated last year
- Legacy version of binary hashcat for Linux (64 bits). Used on airgeddon docker container.☆19Mar 30, 2017Updated 8 years ago
- Safe wrapper around freedesktop.org's fontconfig library, for locating fonts on UNIX like systems.☆23Oct 7, 2025Updated 5 months ago
- A reverse UDP proxy for Teeworlds game play☆10May 10, 2020Updated 5 years ago
- Various C programs I have created from the https://learncgames.com website☆12Mar 5, 2021Updated 5 years ago
- Automated sticky keys hack. Post exploitation it grabs browser passwords, history, and network passwords☆13Jul 17, 2016Updated 9 years ago
- Rust ICMP sockets☆16Nov 23, 2022Updated 3 years ago
- Acamar auto-learning spam blocker addon for WoW / Acamar 自学习垃圾消息屏蔽插件。支持WoW怀旧版。☆17Jun 21, 2021Updated 4 years ago
- 魔兽单体插件更新工具支持win7/win10/mac☆10Jul 7, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- multiple python implementations for image dithering☆18Apr 12, 2024Updated last year
- LuaN1aoAgent is a cognitive-driven AI hacker. It is a fully autonomous AI penetration testing agent powered by DeepSeek V3.2. Using dual-…☆595Mar 17, 2026Updated last week
- simple mcp server to wrap the local instance of grep.☆24Apr 8, 2025Updated 11 months ago
- AWD 文件监控☆29Sep 14, 2023Updated 2 years ago
- See https://www.meriac.com/dl/HID-iCLASS-security.pdf and https://events.ccc.de/congress/2010/Fahrplan/attachments/1784_HID-iClass-27C3.p…☆14Nov 26, 2017Updated 8 years ago
- A proxy software for teaching purposes☆14Feb 3, 2022Updated 4 years ago
- A Discord bot that uses a bash wrapper around a nodejs backend for slash commands.☆11Jun 26, 2021Updated 4 years ago