collisions
paracosme
Our great sponsors
collisions | paracosme | |
---|---|---|
22 | 1 | |
2,909 | 82 | |
1.7% | - | |
6.7 | 2.6 | |
about 1 month ago | 7 months ago | |
Python | Python | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
collisions
- Hash Collisions and Exploitations
-
The Curious Case of MD5
That is still an attack on the second preimage or a collision resistance properties of the hash function. Most collisions do work this way, for example see [1].
[1] https://github.com/corkami/collisions
- Practical advice on finding hash collisions
- GitHub - corkami/collisions: Hash collisions and exploitations - a tool which can manipulate hash quines
-
The Epstein court documents have just been released, over 2000 pages with list of people on that island
it's easy to do if you have a few hours to spare
-
Totális biztonság E-kréta style
remelem nem checksum ellenorzesre https://github.com/corkami/collisions !
-
An open source file Hasher AND Verifier?
Sure, here are two different screenshots of your comment made with this tool:
- Hash collisions and exploitations – Instant MD5 collision
-
Hacker News top posts: Sep 20, 2022
Hash collisions and exploitations – Instant MD5 collision\ (4 comments)
paracosme
What are some alternatives?
some-assembly-required - 📖 An approachable introduction to Assembly.
fsociety - fsociety Hacking Tools Pack – A Penetration Testing Framework
quickhash - Graphical cross platform data hashing tool for Linux, Windows and Mac
commix - Automated All-in-One OS Command Injection Exploitation Tool.
jt89 - sn76489an compatible Verilog core, with emphasis on FPGA implementation and Megadrive/Master System compatibility
zenith - Zenith exploits a memory corruption vulnerability in the NetUSB driver to get remote-code execution on the TP-Link Archer C7 V5 router for Pwn2Own Austin 2021.
EDLA - EDLA remote logic analyser, using ESP32 and Web protocols
AutoSploit - Automated Mass Exploiter
cipher - Bitcoin wallet generator [Moved to: https://github.com/gocrazygh/btcwallet]
featherduster - An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
git - Git Source Code Mirror - This is a publish-only repository and all pull requests are ignored. Please follow Documentation/SubmittingPatches procedure for any of your improvements.
Hash-Buster - Crack hashes in seconds.