Latest version: v0.2.1
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Toolbox for exploring various obsolete ciphers and hash algorithms. Based on mcrypt and mhash.
No known vulnerabilities found
Has known vulnerabilities