Hacker News
- Discussion about local saving data for a program that uses sockets https://hashcat.net/hashcat/ 25 comments askprogramming
- Hashcat 4.0 released. Good for password recovery if you are into things like that. https://hashcat.net/hashcat/ 3 comments ethereum
Linking pages
- How I became a password cracker | Ars Technica http://arstechnica.com/security/2013/03/how-i-became-a-password-cracker/ 1341 comments
- “thereisnofatebutwhatwemake”—Turbo-charged cracking comes to long passwords | Ars Technica http://arstechnica.com/security/2013/08/thereisnofatebutwhatwemake-turbo-charged-cracking-comes-to-long-passwords/ 877 comments
- Hacker, Hack Thyself https://blog.codinghorror.com/hacker-hack-thyself/ 354 comments
- GitHub - trimstray/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/trimstray/the-book-of-secret-knowledge 278 comments
- Speed Hashing http://www.codinghorror.com/blog/2012/04/speed-hashing.html 195 comments
- Full disclosure: 0day vulnerability (backdoor) in firmware for Xiaongmai-based DVRs, NVRs and IP cameras / Habr https://habr.com/en/post/486856/ 155 comments
- Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Security Research https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/ 143 comments
- GitHub - odedshimon/BruteShark: Network Analysis Tool https://github.com/odedshimon/bruteshark 88 comments
- Anatomy of a hack: even your 'complicated' password is easy to crack | WIRED UK http://www.wired.co.uk/news/archive/2013-05/28/password-cracking/viewall 60 comments
- Cracking WiFi at Scale with One Simple Trick https://www.cyberark.com/resources/threat-research-blog/cracking-wifi-at-scale-with-one-simple-trick 50 comments
- Five Pentesting Tools and Techniques (That Every Sysadmin Should Know) | by Jeremy Trinka | Medium https://medium.com/@jeremy.trinka/five-pentesting-tools-and-techniques-that-sysadmins-should-know-about-4ceca1488bff 39 comments
- GitHub - toolleeo/cli-apps: The largest Awesome Curated list of CLI/TUI applications with source data organized into CSV files https://github.com/toolleeo/cli-apps 32 comments
- How to recover a blockchain wallet password | Medium https://keychainx.medium.com/recover-blockchain-com-password-df21cbebac6 22 comments
- Building and Attacking an Active Directory lab with PowerShell – 1337red https://1337red.wordpress.com/building-and-attacking-an-active-directory-lab-with-powershell/ 20 comments
- JWT (JSON Web Token) (in)security - research.securitum.com https://research.securitum.com/jwt-json-web-token-security/ 20 comments
- Technical Advisory – Multiple vulnerabilities in Nuki smart locks (CVE-2022-32509, CVE-2022-32504, CVE-2022-32502, CVE-2022-32507, CVE-2022-32503, CVE-2022-32510, CVE-2022-32506, CVE-2022-32508, CVE-2022-32505) – NCC Group Research https://research.nccgroup.com/2022/07/25/technical-advisory-multiple-vulnerabilities-in-nuki-smart-locks-cve-2022-32509-cve-2022-32504-cve-2022-32502-cve-2022-32507-cve-2022-32503-cve-2022-32510-cve-2022-32506-cve-2022-32508-cve-2/ 16 comments
- Corey Prophitt - A Self-Inflicted Data Breach https://prophitt.me/a-self-inflicted-data-breach 11 comments
- GitHub - trimstray/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/trimstray/awesome-ninja-admins 10 comments
- New attack on WPA/WPA2 using PMKID | by Adam Toscher | Medium https://medium.com/@adam.toscher/new-attack-on-wpa-wpa2-using-pmkid-96c3119f7f99 8 comments
- Using a PIE binary as a Shared Library — HCSC-2020 CTF Writeup | by István Tóth | InfoSec Write-ups https://medium.com/@an0n_r0/using-a-pie-binary-as-a-shared-library-hcsc-2020-ctf-writeup-390a8a437f31 7 comments
Related searches:
Search whole site: site:hashcat.net
Search title: hashcat - advanced password recovery
See how to search.