Length Extension Attack Last modified: 2023-07-28 Exploitation We can exploit the vulnerability with hash_extender. References https://en.wikipedia.org/wiki/Length_extension_attack https://github.com/iagox86/hash_extender