This blog intends to expose some security algorithms (like MD5, SHA, PGP, etc...) and their respective security breaches / vulnerabilities, even if the only thing useful to post is the code capable of breaking the cyphers created by the used algorithms. 

Be aware that this blog does not support piracy, its only meant to publish breakthroughs about cypher's decryption.

Published by fxsf às 15:29