A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.
-
Updated
Oct 25, 2024 - C
Handshake is a decentralized, permissionless naming protocol where every peer is validating and in charge of managing the root DNS naming zone with the goal of creating an alternative to existing Certificate Authorities and naming systems. Names on the internet (top level domains, social networking handles, etc.) ultimately rely upon centralized actors with full control over a system which are relied upon to be honest, as they are vulnerable to hacking, censorship, and corruption. Handshake aims to experiment with new ways the internet can be more secure, resilient, and socially useful with a peer-to-peer system validated by the network's participants.
A small set of tools to convert packets from capture files to hash files for use with Hashcat or John the Ripper.
Get handshake and crack wpa/wpa2 security wifi passwords
A simple vault for storing cookie secrets that can be used while generating and verifying a cookie during the DTLS handshake procedure (HelloVerifyRequest, RFC6347) (https://tools.ietf.org/html/rfc6347#section-4.2)
Sample implementation of SCTP (RFC4960) Handshake using C socket Programming
A secure connection between client and server using the TLS1.2 protocol.
Released 2018