News
Abstract: In this paper, a new chaos-based hash function is proposed based on a recently proposed structure known as the deterministic chaotic finite state automata (DCFSA). Out of its various ...
Abstract: In this paper, we analyze collision resistance of the JH hash function in the ideal primitive model. The JH hash function is one of the five SHA-3 candidates accepted for the final round of ...
File-based credential vault: SHA-256 email IDs, bcrypt-salted passwords, each record Fernet-encrypted and appended to one log + tiny index for O(1) look-ups. No database, two files, scales to millions ...
revealhashed v0.1 usage: revealhashed [-h] [-r] {dump,reveal} ... positional arguments: {dump,reveal} dump Dump NTDS using ntdsutil then reveal credentials with it reveal Use your own NTDS dump then ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results