Implementation of bcrypt password hashing scheme
☆12Jan 11, 2021Updated 5 years ago
Alternatives and similar repositories for crypt_blowfish
Users that are interested in crypt_blowfish are comparing it to the libraries listed below
Sorting:
- Password/passphrase strength checking and policy enforcement☆47Mar 2, 2026Updated 2 weeks ago
- Proof-of-work scheme building upon yescrypt and scrypt☆35Jun 15, 2025Updated 9 months ago
- Test Suite for John the Ripper☆25Dec 28, 2025Updated 2 months ago
- MF Signaling in Asterisk!☆12Jul 2, 2021Updated 4 years ago
- Auto call generator for telephone switches at Connections Museum, Seattle.☆18Apr 27, 2025Updated 10 months ago
- A tool to dynamically inspect macro execution in Office documents☆13Aug 13, 2016Updated 9 years ago
- python-csp provides python with communicating sequential processes style parallelism☆12Jul 13, 2021Updated 4 years ago
- indent IMAP body structures☆15Jan 26, 2021Updated 5 years ago
- Python connector library for communicating with a U2FVAL server☆15Apr 7, 2017Updated 8 years ago
- 3D with SvelteKit and Babylon.js☆10Aug 24, 2023Updated 2 years ago
- Alternative password shadowing scheme☆10Feb 22, 2026Updated last month
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated 2 years ago
- ☆11Feb 9, 2023Updated 3 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- Arquivos utilizados nas vídeo aulas do Garcia canal Planilheiros☆24Nov 4, 2022Updated 3 years ago
- Log4net provider for the Microsoft.Extensions.Logging framework.☆11Jan 31, 2018Updated 8 years ago
- This is the official dahdi-tools repository. All issues and PR should be raised here.☆19Mar 3, 2026Updated 2 weeks ago
- A blazing fast, MT-safe, lockfree and branchless circular byte buffer for SPSC in 50 loc☆13Sep 16, 2025Updated 6 months ago
- 🌌 Real-time threat detection for smart contracts☆10May 16, 2023Updated 2 years ago
- Event Query Router☆12Aug 9, 2019Updated 6 years ago
- 🌈 Python cheatsheet for all standard libraries☆18Jan 3, 2026Updated 2 months ago
- Alfa Bank Patcher☆19Feb 2, 2026Updated last month
- Go implementation of scrypt and yescrypt key derivation and password hashing functions☆17Aug 21, 2024Updated last year
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Spider - web crawler and local wordlist processor to generate frequency sorted wordlist / ngrams☆28Updated this week
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- ETHICAL-HACKING☆12Dec 20, 2023Updated 2 years ago
- 基於 “正方软件股份有限公司” 的教務管理平台提供驗證碼識別服務(公開版)☆10Oct 4, 2018Updated 7 years ago
- Asyncio Financial Information eXchange Engine☆13Jan 4, 2021Updated 5 years ago
- proxy service that changes basic auth to oauth 2. designed for Exchange Web Services (EWS)☆17Sep 20, 2022Updated 3 years ago
- SAL Plus : Sistema de Acompanhamento de Licitações e Contratos☆14Feb 5, 2018Updated 8 years ago
- Asterisk sounds by Pat Fleet☆26Jun 21, 2022Updated 3 years ago
- Easy package.json exports.☆30Apr 19, 2023Updated 2 years ago
- Legacy password hashing framework for PHP applications needing to support or having previously supported PHP below 5.5☆16Nov 22, 2024Updated last year
- A simple tftp-to-http proxy☆25Apr 15, 2019Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Exploring the deterministic chaos of a magnetic pendulum☆14Aug 10, 2022Updated 3 years ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- Queries for Carbon Black Response