Skip to content
View cforler's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Block or report cforler

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Password-based key derivation function and password hashing scheme building upon scrypt

C 187 12 Updated Sep 18, 2025

Some scripts to abuse kerberos using Powershell

PowerShell 355 46 Updated Jul 27, 2023

A basic implementation of visual system neural information flow.

Python 12 2 Updated Mar 6, 2026

Code for "Generative adversarial networks for reconstructing natural images from brain activity".

Python 5 1 Updated Mar 6, 2026

A curated list of amazingly awesome Cybersecurity datasets

1,942 327 Updated Mar 2, 2024

TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.

C 25,435 3,198 Updated Jun 5, 2025

Simple TCP Server implementation using epoll in C

C 2 1 Updated Jul 30, 2024

An interactive application about password strength implementing the zxcvbn library

Vue 1 Updated Sep 8, 2022

Slides and other materials from CppCon 2018

C++ 1,447 179 Updated Apr 11, 2019

One-end encryption, stronger than end-to-end

Rust 243 13 Updated Jan 28, 2026

Production of Password Encryption Archives for files, notebooks, images...

Java 7 1 Updated Nov 9, 2021

Reference Implementation of Catena, a memory-consuming password scrambler

C 32 6 Updated Mar 26, 2018

A little tool to play with Windows security

C 21,341 4,041 Updated May 11, 2025

cryptographic stuff

Java 6 Updated Apr 12, 2016

Flexible version of the Catena password scrambler

C 4 1 Updated Mar 26, 2018

Arduino implementation of POET (Pipelineable On-line Encryption with authentication Tag)

C 1 Updated Jan 12, 2015
Java 2 Updated Jun 5, 2013

The new NOELKDF memory hard KDF I'm working on, as a successor to keystretch

C 2 Updated Feb 17, 2014

Mack the Knife is a modular password cracking framework which relies on heavy parallel computing on the GPU using Nvidia's CUDA technology. The name Mack the Knife comes from the protagonist from B…

C++ 5 3 Updated Sep 20, 2012