Latest version: v1.3.2
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Software to identify the different types of hashes used to encrypt data and especially passwords
No known vulnerabilities found
Has known vulnerabilities