Search code examples
"Invalid JSON primitive: alihack" errors coming from an ASP.NET MVC site...


asp.netiiscracking

Read More
C program compiled file with clang leads to zsh: segmentation fault error when i try to change the a...


cgccclangzshcracking

Read More
Is it possible to crack SHA256, when you know the answer is a coordinate?...


pythoncoordinatessha256cracking

Read More
ARM Assembly - what does it mean to add something to the SP(stack pointer)?...


assemblyarmreverse-engineeringcracking

Read More
Python SMTP not logging in...


pythonemailsmtpcracking

Read More
how to crack a random substitution text cypher?...


pythonlistrandomcracking

Read More
is there any codeforce-like site for improving system security(aka cracking) skills?...


securitycracking

Read More
How to create a brute-force password cracker for alphabetical and alphanumerical passwords?...


pythonpython-3.xbrute-forcecracking

Read More
Is a password pattern validator a security vulnerability?...


securitybackendpassword-protectioncracking

Read More
In zsh how do you make a loop that when the command FAILS, it retries the same command with new argu...


loopserror-handlingzshcracking

Read More
Can Forest crack public-key cryptography?...


public-key-encryptioncrackingquantum-computing

Read More
Decrypt MD5 hash...


pythoncryptographymd5cracking

Read More
what's the meaning of 'admin' OR 1=1 -- '...


phpmysqlsecuritysql-injectioncracking

Read More
OTP/XOR Cracking two ciphertexts that have the same key...


cryptographyxorone-time-passwordcracking

Read More
How long would it take for a sha256 digest loop to reach the original hash or start cycling?...


encryptionhashgpusha256cracking

Read More
Getting SHA1 through programming...


javaandroidgradlesigningcracking

Read More
Cracking passwords with DES algorithm given hash and salt...


pythonhashopensslcrackinghashcat

Read More
Limitation in the implementation of Brute Force...


cpasswordsundefined-behaviorbrute-forcecracking

Read More
How can I change BNE instruction to BEQ and change its argument?...


armdisassemblycracking

Read More
Get constant SALT from encrypted and clear text values...


saltbrute-forcecracking

Read More
Two compiled binary files with exactly same assembly code behaves differently while cracking binary ...


diffreverse-engineeringpatchcrackingghidra

Read More
How to ignore execution of some line of binary file?...


c++assemblygdbcracking

Read More
Number of possible sequences of 16 symbols are there given some restrictions...


cmathcombinationscracking

Read More
Debug a release version of an OSX App via LLDB...


cassemblyreverse-engineeringlldbcracking

Read More
hashcat - toggle-case dictionary attack (case sensitive)...


linuxcrackinghashcat

Read More
Estimating Password Cracking Times...


securityhashpasswordscracking

Read More
How to create a breakpoint using ollydbg for a winApi function call, e.g. a breakpoint for a GetDigi...


winapireverse-engineeringbreakpointsollydbgcracking

Read More
Jack the ripper zip password cracking process - unshadow...


password-protectioncracking

Read More
What is the mistake in this script in python...


pythonpython-3.xmd5hashlibcracking

Read More
Are hex passwords of a known length easy to crack?...


passwordshexcracking

Read More
BackNext