thanosgn / rainbow-table-attack
A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.
☆15Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for rainbow-table-attack
- Audible Electromagnetic Interference Detector - Model ET-1☆14Updated 4 years ago
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Spark MLib Training Models for Network Security☆16Updated 6 years ago
- Python module for interacting with Bluetooth MSR card reader/writers☆10Updated 6 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Updated 6 years ago
- A super micro fun implant☆23Updated 5 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- ☆15Updated 8 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 7 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- An open radio protocol for transmitting UAV flight data in real time.☆11Updated 7 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- ☆13Updated 7 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- HTTPLeaks - All possible ways, a website can leak HTTP requests☆15Updated 9 years ago
- DES cracking using brute force algorithm and CUDA☆23Updated 7 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- Proof-of-concept implementation of the Apple relay attack in Python☆30Updated 10 years ago
- Process QPSK-demodulated data into transport stream (SCTE 55-1)☆21Updated 8 years ago
- Misc PoCs for various research topics☆21Updated 2 years ago
- Magnetic stripe spoofer implementing audio waves.☆37Updated 7 years ago
- A highly portable, self-contained version of ROUND5 post-quantum algorithms for embedded platforms.☆17Updated 4 years ago
- Capture data from QPSK-demodulated OOB bitstream with Saleae logic analyzer and output byte stream.☆19Updated 8 years ago
- ☆10Updated 2 months ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Hardware design files for the PMOD based MUX☆13Updated 5 years ago