News

Abstract: In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various ...
Abstract: In this paper, we analyze collision resistance of the JH hash function in the ideal primitive model. The JH hash function is one of the five SHA-3 candidates accepted for the final round of ...
File-based credential vault: SHA-256 email IDs, bcrypt-salted passwords, each record Fernet-encrypted and appended to one log + tiny index for O(1) look-ups. No database, two files, scales to millions ...
revealhashed v0.1 usage: revealhashed [-h] [-r] {dump,reveal} ... positional arguments: {dump,reveal} dump Dump NTDS using ntdsutil then reveal credentials with it reveal Use your own NTDS dump then ...