Linking pages
- How I became a password cracker | Ars Technica http://arstechnica.com/security/2013/03/how-i-became-a-password-cracker/ 1341 comments
- GitHub - trimstray/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/trimstray/the-book-of-secret-knowledge 278 comments
- Cisco switches to weaker hashing scheme, passwords cracked wide open | Ars Technica http://arstechnica.com/security/2013/03/cisco-switches-to-weaker-hashing-scheme-passwords-cracked-wide-open/ 177 comments
- Choosing a Secure Password | Boing Boing http://boingboing.net/2014/02/25/choosing-a-secure-password.html 117 comments
- Looking inside the box - Anvil Secure https://anvilventures.com/blog/looking-inside-the-box.html 69 comments
- I Lost $17,000 in Crypto. Here’s How to Avoid My Mistake | WIRED https://www.wired.com/story/i-lost-17000-dollars-crypto-how-to-avoid/?mbid=social_twitter&utm_brand=wired&utm_social-type=owned 66 comments
- How the Bible and YouTube are fueling the next frontier of password cracking | Ars Technica http://arstechnica.com/security/2013/10/how-the-bible-and-youtube-are-fueling-the-next-frontier-of-password-cracking 64 comments
- Best Open Source Software List | Datamation http://www.datamation.com/open-source/open-source-software-list-2015-ultimate-list-1.html 33 comments
- Cracking Passwords using John The Ripper | by Manish Shivanandhan | Nov, 2022 | Stealth Security https://stealthsecurity.io/cracking-passwords-using-john-the-ripper-977943d7ab38 29 comments
- Learn Rust by implementing a SHA-1 hash cracker https://kerkour.com/learning-rust-sha1-hash-cracker 27 comments
- [Nodejs] Security: Broken Authentication | by Peter Chang | CloudBoost https://medium.com/@peterchang_82818/node-security-authentication-javascript-tutorial-example-session-brute-force-rainbow-table-crack-hijack-3b6c56ee938c 18 comments
- Look Back on 2012's Famous Password Hash Leaks - Wordlist, Analysis and New Cracking Techniques http://blog.thireus.com/look-back-on-2012s-famous-password-hash-leaks-wordlist-analysis-and-new-cracking-techniques 13 comments
- GitHub - trimstray/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/trimstray/awesome-ninja-admins 10 comments
- 50 Open Source Tools To Replace Popular Security Software | Datamation http://www.datamation.com/open-source/100-open-source-replacements-for-popular-security-tools-1.html 10 comments
- GitHub - psypanda/hashID: Software to identify the different types of hashes - https://github.com/psypanda/hashid 9 comments
- Essays: Choosing a Secure Password - Schneier on Security https://www.schneier.com/essays/archives/2014/02/choosing_a_secure_pa.html 8 comments
- 10 Best Security Software Tools for Linux | Tech Source http://www.junauza.com/2008/07/10-best-hacking-and-security-software.html 7 comments
- The Rainbow Table Is Dead | ircmaxell's Blog http://blog.ircmaxell.com/2011/08/rainbow-table-is-dead.html 5 comments
- Rails 2.0 cookies (updated) - Ruby on Rails Security Project http://www.rorsecurity.info/2007/11/20/rails-20-cookies/ 4 comments
- GitHub - iLabAcademy/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. https://github.com/iLabAcademy/the-book-of-secret-knowledge 4 comments
Related searches:
Search whole site: site:openwall.com
Search title: John the Ripper password cracker
See how to search.