hash_extender
By iagox86
dnscat2
By iagox86
hash_extender | dnscat2 | |
---|---|---|
2 | 5 | |
1,041 | 3,257 | |
- | - | |
0.0 | 0.0 | |
10 months ago | about 2 months ago | |
C | PHP | |
GNU General Public License v3.0 or later | BSD 3-clause "New" or "Revised" License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
hash_extender
Posts with mentions or reviews of hash_extender.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-11-13.
-
Perform a length extension attack on SHA256. Can someone help me find what I'm doing wrong?
I have performed the attack using this hash_extender and got the correct signature, but I'm getting the wrong answer when I try to perform the attack by modifying the original algorithm.
-
Awesome CTF : Top Learning Resource Labs
Hash Extender - A utility tool for performing hash length extension attacks.
dnscat2
Posts with mentions or reviews of dnscat2.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-01-20.
- HOUDINI: A web app with huge number of Docker Images for Network Security with run commands and cheatsheet (Hundreds of Offensive and Useful Docker Images for Network Intrusion )
-
Awesome CTF : Top Learning Resource Labs
Dnscat2 - Hosts communication through DNS.
- Are there any methods to protect against DNS tunneling (non-encrypted) in an open-source firewall appliance?
-
Awesome Penetration Testing
dnscat2 - Tool designed to create an encrypted command and control channel over the DNS protocol, which is an effective tunnel out of almost every network.
-
DNS exfiltration of data: step-by-step simple guide
Another commonly used tool is dnscat. I’ve seen it successfully used by adversaries and during pentests.