#
hashes
Here are 74 public repositories matching this topic...
This is the official repo for John the Ripper, "Jumbo" version. The "bleeding-jumbo" branch is based on 1.9.0-Jumbo-1 which was released on May 14, 2019. An import of the "core" version of john this jumbo was based on (or newer) is found in the "master" branch (CVS: https://cvsweb.openwall.com/cgi/cvsweb.cgi/Owl/packages/john/john/src/).
-
Updated
Jun 17, 2020 - C
Practical Cryptography for Developers: Hashes, MAC, Key Derivation, DHKE, Symmetric and Asymmetric Ciphers, Public Key Cryptosystems, RSA, Elliptic Curves, ECC, secp256k1, ECDH, ECIES, Digital Signatures, ECDSA, EdDSA
python
cryptography
tutorial
programming
aes
book
ecc
digital-signature
ecdh
hmac
elliptic-curves
kdf
hashes
public-key-cryptography
elliptic-curves-cryptography
key-agreement
asymmetric-ciphers
quantum-safe-cryptography
-
Updated
Jun 22, 2020 - CSS
A Hashcat wrapper for distributed hashcracking
distributed-computing
hash
distributed
pentesting
passwords
hashes
cracking
hashcat
hashlist
hashtopussy
hashtopolis
-
Updated
Jul 14, 2020 - PHP
A web front-end for password cracking and analytics
analytics
distributed
penetration-testing
pentesting
passwords
hashes
hashcat
security-tools
password-cracking
-
Updated
Mar 13, 2019 - CSS
Automated decryption tool
python
natural-language-processing
cryptography
cipher
neural-network
cpp
hacking
artificial-intelligence
pentesting
ctf
hashes
decryption
ctf-tools
deep-neural-network
-
Updated
Jul 29, 2020 - Python
SRI Hash Generator
-
Updated
Jul 20, 2020 - HTML
Cracking hashes in the Cloud for free
-
Updated
Jun 22, 2020 - Jupyter Notebook
Quickly remove duplicates, without changing the order, and without getting OOM on huge wordlists.
c
wordlist
duplicates
remove-duplicates
text-processing
uniq
duplicates-removed
john
hashes
cracking
wordlist-generator
unique
uniqueness
duplicate-detection
password-cracking
password-wordlist
wordlist-technique
uniquifier
uniq-replacement
wordlist-processing
-
Updated
Dec 22, 2019 - C
Secure password hashers for Go compatible with Django
-
Updated
Apr 3, 2020 - Go
global hosting, financial automation, server-less web components
-
Updated
Feb 27, 2018 - Go
Extract hashes and plain passwords from Dump Monitor tweet
-
Updated
Mar 8, 2016 - Python
Extension to HiJack/control web miners (like CoinHive)
chrome-extension
firefox
chrome
bitcoin
mining
cryptocurrency
web-mining
hashes
monero
coinhive-miners
-
Updated
Nov 7, 2017 - JavaScript
Simplistic (but fast) java implementation of a bloom filter.
-
Updated
Feb 14, 2020 - Java
A simple but fast bloomfilter written in Python
-
Updated
Jan 9, 2019 - Python
Web-app to identify the different types of hashes
-
Updated
Aug 22, 2019 - JavaScript
The easiest JWT library to GO
go
golang
jwt
encryption
authentication
authorization
bcrypt
golang-library
hashes
go-jwt
jwt-go
go-libray
-
Updated
Jul 11, 2020 - Go
A C++ Cryptographic Hash Algorithms Library
-
Updated
Jul 18, 2020 - C++
Command line tools and library to work with hashes and various encodings
-
Updated
Feb 14, 2020 - Go
Use CDNJS as a source to build hashes of known JS/CSS/IMG/... content used all over the internet
-
Updated
Jun 22, 2020 - Python
Encrypted plain file keyring backend for the python keyring package
python
mac
cryptography
attack
argon2
desktop
secrets
pycrypto
gcm
keyring
encrypted-data
hashes
keyrings
eax
ccm
symmetric-cryptography
pycryptodome
userid
ocb
-
Updated
Nov 29, 2019 - Python
Durvasav is a bruteforce password cracker (BfPC) written in C.
openssl
bruteforce
md5
sha1
sha256
hashes
md4
sha512
sha384
sha224
password-cracker
bruteforce-password-cracker
wirdlist-generator
sha0
-
Updated
Sep 28, 2018 - C
Lookup file hashes, domain names and IP addresses using various vendors to assist with triaging potential threats.
api
intelligence
query
geoip
malware-research
hashes
domain-name
threatgrid
sinkhole
rbl
whois-lookup
threats
virustotal
otx
ip-address-lookup
dbl
emerging
quad9
threat-triage
seclytics
-
Updated
Jul 29, 2020 - VBScript
A python based script to updaet DNS entries in ADIDNS
security
hacking
responder
hashes
vlan
cyber-security
llmnr
redteam
hacking-tools
dnsupdate
adidns
nbns
adidns-zones
gather-hashes
responder-ip
-
Updated
Jun 11, 2020 - Python
Objects are functions! Treat any Object, Classes, Hashes, Arrays, and Sets as Procs (like Enumerable but for Procs)
ruby
ruby-gem
set
memoize
memoization
functional-programming
functions
array
hash
hash-map
data-structures
arrays
objects
currying
hashes
object-oriented-programming
ruby-lambda
ruby-proc
hash-maps
-
Updated
Jul 28, 2020 - Ruby
Improve this page
Add a description, image, and links to the hashes topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the hashes topic, visit your repo's landing page and select "manage topics."