You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyzes headers, APIs, and strings, giving quick insights for threat detection.
Explore hashing algorithm performance with this Python script. It measures the average time needed to hash random strings of varying lengths, leveraging multiprocessing for efficient concurrent hashing. The script produces insightful bar chart visualizations, stores results in JSON format, and generates interactive HTML plots for in-depth analysis.
This is a secure password checker written in Python that uses data harvested from haveibeenpwned API to verify whether the password you are using has already been leaked.
Information Security -- How to hack a password. One particular use case for hashing is for user authentication. Given an original object (password, file, image, etc), the content is hashed into SHA1, or MD5, and stored in database. So, even the application could not revert a given hashed object to its original content. To authenticate, the user …
A (dummy) implementation of the SHA-1 encryption algorithm written for educational purposes. Includes a birthday attack which finds collisions on the first 32 bits of different output digests.