Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality. Learn more →
Top 5 C Password Projects
-
john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
duplicut
Remove duplicates from MASSIVE wordlist, without sorting it (for dictionary-based password cracking)
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
Project mention: Hacking WiFi 101: basic concepts, terminology, and a real-life example | dev.to | 2024-04-03Hashcat Cracking WPA/WPA2 Spacehuhn's Deauther
John The Ripper
Project mention: Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video] | news.ycombinator.com | 2023-08-08when you look properly at the end of the video the root hash starts with $y$ implying its yescrypt
more info here https://manpages.debian.org/unstable/libcrypt-dev/crypt.5.en...
https://www.openwall.com/yescrypt/
once you have the hash you have to use some rainbow tables if they exist for that hash function or bruteforce it
the authors of yescrypt claim: "Technically, yescrypt is the most scalable password hashing scheme so far, providing near-optimal security from offline password cracking across the whole range from kilobytes to terabytes and beyond. "
in any way, this is a local attack, someone / some software on your local machine would need to execute it so i am not overly stressed, password hashes leak all the time from all different sources
yet, it does worry me because my AMD stock is dropping on value because of this today :D
C Password related posts
-
password decryption help
-
How to get hash from encrypted .vbox file?
-
command zip2john not found help
-
Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video]
-
ETH Pre-Sale-Wallet and Hashcat
-
How to pass this captcha?
-
Is there a way to brute force wifi passwords from a known list
-
A note from our sponsor - InfluxDB
www.influxdata.com | 7 May 2024
Index
What are some of the best open-source Password projects in C? This list will help you:
Project | Stars | |
---|---|---|
1 | hashcat | 19,913 |
2 | john | 9,289 |
3 | duplicut | 777 |
4 | houndsniff | 151 |
5 | yescrypt | 115 |
Sponsored