logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Researcher Publishes PoC Exploit for Privilege Escalation Flaw (CVE-2023-0179) in Linux Kernel
  • ProxyNotShell, OWASSRF, TabShell: Patch Your Microsoft Exchange Servers Now
  • Vulnerability Summary for the Week of January 23, 2023
  • What SOCs Need to Know About Water Dybbuk, A BEC Actor Using Open-Source Toolkits
  • New High-Severity Vulnerabilities Discovered in Cisco IOx and F5 BIG-IP Products

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2021-36539 (canvas_learning_management_service) 26 January 2023
  • CVE-2021-28510 (eos) 26 January 2023
  • CVE-2020-36657 (uptimed) 26 January 2023
  • CVE-2020-22452 (phpmyadmin) 26 January 2023
  • CVE-2020-22327 (hfish) 26 January 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

hashcracker

Posted on 18 February 2020

From github.com

alt text

HashCracker is a python hash cracker which support hashing algorithms like SHA512, SHA256, SHA384, SHA1, MD5, SHA224.

  • Auto detection of hashing algorithm based on length (not recommended)
  • Bruteforce
  • Password List

Read more…

Posted in News

Post navigation

Previous post: Beware!! U.S Issued a Critical Alert For Several Ongoing Malware Attacks in Wide From North Korean Hackers
Next post: Zero Trust Approach to Threat Intelligence – BSidesSF Preview
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.