asteroza + hash   109

pocs/README.md at master · corkami/pocs
Instant (pre-computed prefix), re-usable & generic (any file pair!) MD5 collisions over different file formats. If someone were a real bastard, and got their hands on a naughty file hash database, this can wreak untold havoc
MD5  hash  collision  cryptography 
9 weeks ago by asteroza
Alexandr Andoni -- Columbia University
fuzzy hash == nearest neighbor search, which means this guys Ph.D is required reading
nearest  neighbor  search  fuzzy  hash  hashing  algorithm  research 
10 weeks ago by asteroza
IshanAtlas/blindhash: BlindHash Implementation
demo blindhash implementation? but it's patented...
blind  hash  opensource  software  security  demo  PoC 
november 2017 by asteroza
BlindHash-Restoring Trust in Passwords
Password hashing security as a service (more like salt as a service), using a 16TB salt and a new blind hashing technique. Functions like a Crypto Anchor.
security  service  password  blind  hash  encryption  cryptography  salt  CryptoAnchor 
november 2017 by asteroza
Scripting/inVteroJitHash.py at master · K2/Scripting
Calling a server which seems to have per page SHA256 hashes for every windows binary, ever
windows  page  hash  SHA256  lookup  binary  integrity  check  test  DFIR  security 
october 2017 by asteroza
Password API
Oh hey, password hash lookup service...
security  hacking  pentesting  password  hash  lookup  service 
july 2017 by asteroza
LogSentinel (alpha) - Blockchain-inspired secure audit trail service
sorta like a timestamping service, but who is doing the blockchain really?
blockchain  log  audit  trail  service  hash  security 
july 2017 by asteroza
Hashes.org - Home
Hashes.org is a community recovering password from submitted hashes.
password  hash  reference  list  repository  hacking  cracking  security  pentesting 
june 2017 by asteroza
ashwin711/proximityhash: Geohashes in proximity
proximity hash using circular/polar reasoning, rather than rectangular, to speed up distance from point calculations for nearness
circular  geospatial  spatial  index  hash  geohash  library  software  opensource  GIS  proximity  Delicious 
june 2017 by asteroza
jandrewrogers/MetroHash: Exceptionally fast and statistically robust hash functi...
Interesting hash functions from the dude behind the SpaceCurve geospatial database
hash  function  software  opensource  Delicious 
june 2017 by asteroza
dryman/opic: Fast serialization framework for C
Doing this in C because C++ results in runtime dependencies?
object  serialization  framework  hash  table  map  key  value  store  index  Delicious 
may 2017 by asteroza
IPFS is the Distributed Web
Interesting distributed content addressable document store, built using something like DHT, so you are basically calling out for hashes like a magnet link. As an alternative to Freenet/Zeronet and friends.
distributed  content  addressable  document  store  DHT  hash  address  bitswap  protocol  torrent  Delicious 
january 2017 by asteroza
lgandx/Responder: Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in ...
This is that tool for sucking password hashes out of a windows machine by plugging in a USB Armory emulating a USB ethernet adapter.
responder  windows  attack  exploit  software  password  hash  retrieval  security  pentesting  hacking  Delicious 
december 2016 by asteroza
p3nt4/metasploit-modules: This module will change a local user's password direct...
Metasploit module for directly carving out and replacing password hashes to forcibly change a user password.
metasploit  module  security  pentesting  hacking  windows  user  password  change  registry  attack  hash  carve  Delicious 
december 2016 by asteroza
JPCERT/CC Blog: Verification of Windows New Security Features – LSA Protection M...
So the short story is the increased security from LSA Protection Mode or Credential Guard protects domain users mostly, if domain password caching is disabled. But local passwords are still vulnerable to Mimikatz, and password reuse is a thing...
Windows  domain  logon  password  hash  security  research  lateral  movement  pentesting  hacking  Delicious 
november 2016 by asteroza
Password Hashing Competition
Argon2 is like scrypt, but the implementation is simpler to formally analyze
password  hash  algorithm  Argon2  scrypt  cryptography  security  research  Delicious 
november 2015 by asteroza
The Shappening
So, why hasn't a kickstarter happened to crowdsource the $100K or so needed to crack SHA-1 on AWS and permanently put it out to pasture?
SHA1  SHA-1  collision  hash  encryption  crytography  cryptographic  algorithm  software  research  security  hacking  freestart  attack  cryptography  Delicious 
october 2015 by asteroza
kai | Free software downloads at SourceForge.net
A smaller version of Amazon Dynamo, apparently used within Goo.home in japan
store  hash  distributed  opensource  alternative  table  datastore  kai  amazon  software  japan  DHT  dynamo  goo  scalable  value  key  Delicious 
august 2013 by asteroza
« earlier      
per page:    204080120160

related tags

2.0  8.1  97-2003  acceleration  active  AD  address  addressable  administrator  ADS  adversarial  AES  aHash  ajax  algorithm  alogirthm  alternate  alternative  amazon  AMSS  analysis  android  anonymized  anonymous  antimalware  antivirus  API  app  architecture  Argon2  art  article  articles  asset  association  attack  audio  audit  authentication  autorun  availability  base64  based  BashBunny  binary  bitswap  blind  block  blockchain  bloodhound  bookmarklet  breaking  brute  bulk  c  c++  cache  Cain  candidate  captcha  capture  carve  catalog  CD  CFS  change  check  checksum  chord  cipher  circular  clean  clearinghouse  clearninghouse  clipperz  cloud  CloudCracker  CMX  code  collision  color  communities  comparison  competition  compiled  content  conversion  convert  converter  cooperative  cracker  cracking  creation  cropping  cryptanalysis  crypto  CryptoAnchor  cryptographic  cryptography  crytography  CUDA  data  database  databases  datamining  dataset  datastore  datawarehouse  decode  decryption  deep  Delicious  demo  derivative  development  DFIR  DHash  dHash  DHT  dictionary  digital  directory  distance  distributed  document  domain  dump  duplicate  dynamo  ECC  efficient  Elecom  emergency  encode  encoded  encoder  encryption  endpoint  engine  escape  example  exchange  exploit  explorer  extension  extraction  family  file  filesystem  filter  filtering  fingerprint  FIPS-202  FIPS202  firefox  firmware  footprint  force  forensic  forensics  forward  framework  framing  free  freestart  function  fuzzy  generator  genpass  geohash  geospatial  GIS  golden  goo  good  GPGPU  GPU  guide  guilt  hacking  hamming  Hancock  harness  hash  hashcat  hashing  hashtable  high  history  hop  icons  identicon  identity  IEEE  illustrated  image  impersonation  incident  index  information  infosec  inmemory  integrity  Intel  interest  IoC  japan  java  javascript  JohntheRipper  jshashtable  json  JtR  kai  keccak  kerberos  kereberos  key  known  language  lateral  length  library  lifetime  linux  list  listing  live  LiveCD  LM  local  log  logon  lookup  lophtcrack  luhn  mac  machinelearning  MacKrack  malware  management  manipulation  map  mapping  matching  MD5  memory  message  metadata  metasploit  mimikatz  mining  module  modulus  monitoring  morphing  movement  MS-CHAP  MS-CHAPv2  multiple  multirelay  near  near-duplicate  nearest  neighbor  NIST  NSRL  NTFS  NTLM  NTLMN  NTLMv1  Nvidia  object  ObPwd  office  offline  one  online  open  OpenCL  openDHT  OpenDHT  opensource  ophcrack  OS  OSX  p2p  page  pass  passing  password  penetration  pentesting  perceptual  performance  pHash  photo  picture  piecewise  pixel  planetlab  plugin  PoC  powershell  primary  privacy  PRNG  programming  properties  protocol  proximity  pshtoolkit  public  python  RADIUS  rainbow  RC4  recovery  reference  regex  registry  relationship  relay  repository  research  resource  responder  retrieval  reverse  S3  safety  salt  sandbox  saturation  scalability  scalable  scaling  scanner  scheduled  schneier  script  scrypt  search  seccurity  secrecy  secure  security  selfdestruct  serialization  server  service  SHA  SHA-1  SHA-3  SHA-256  SHA1  SHA2  SHA3  SHA256  signature  skein  SLA  small  SMB  SMBv1  SMBv2  smuggling  SOA  software  spatial  specific  speed  SPN  sponge  spoofing  spookyhash  SRP  storage  store  stream  streaming  string  sub-image  sum  supergenpass  switchblade  sysadmin  system  table  tables  task  test  testing  text  ticket  token  toolkit  tools  torrent  trail  transformation  U3  UED  URL  USB  user  UTF-8  utilities  value  Vanish  variant  Vash  video  virus  VirusTotal  Vista  visual  visualization  vuze  way  web  webdev  whitelist  windows  WPA  WPA2  WPA2-enterprise  YARA  zero 

Copy this bookmark:



description:


tags: