Browser extension - Uses chess moves to generate secure hashed passwords.
-
Updated
Feb 7, 2025 - JavaScript
Browser extension - Uses chess moves to generate secure hashed passwords.
SHA-256 is a cryptographic hash function that generates a 256-bit (32-byte) hash value. It is widely used to ensure data integrity and security by creating a unique digital fingerprint for a given input, making it highly resistant to tampering or duplication.
Reconstruct files from a cryptographic hash
B.Tech Final Year Project 2021-2025. A smart agriculture monitoring system integrating IoT sensors, Blockchain, and Machine Learning to improve crop productivity, ensure secure data handling, and provide real-time monitoring for farmers.
เพื่อเรียนรู้การ encryption decryption and digital signature เพื่อ Authentication ในการเลือกหัวหน้าทีมในการเลือกตั้ง พร้อมยังสามารถตรวจสอบหลักฐานการโหวตได้จาก Hash ข้อมูลทั้งหมด ด้วย SHA-512 เพื่อตรวจสอบคามถูกต้อง Data Integrity
A MESH-based Lo-Ra radio-text anonymous messenger with asymmetric RSA encryption and guaranteed message delivery.
The Document Verification System is a beginner-friendly, console-based Python application that uses a simple blockchain to verify documents.
Blockchain implementation in Golang
The method for creating a secured patient's data transfer using blockchain simulation on localhost. The simulation implements a cryptographic algorithm to ensure the security of the blockchain blocks. The cryptographic algorithm used is the SHA-256 (Secure Hash Algorithm 256-bit).
A secure password manager application to safely store, modify and remove an end-user’s data and personal information.
LedgerLens is a full-stack, tamper-evident research notebook built with FastAPI, SQLModel, React, and Tailwind. It ensures data integrity using SHA-256 hash chaining, supports file attachments, real-time verification, Dockerized deployment, and includes tests with CI for reliability.
Pixshotcryption is an interactive cybersecurity tool that combines advanced encryption and steganography to securely hide messages in images. Ideal for confidential communication, securing intellectual property, and digital media integrity verification where data security is critical.
A collection of easy-to-use cryptographic tools in Python. This repository offers functions for password hashing with argon2, data hashing with SHA256, and file encryption/decryption using AES-GCM. Perfect for developers looking for a simple and secure way to implement cryptographic features in their Python projects. Run - pip install crypto-tools
System that authenticates users via camera EXIF metadata and cryptographic signatures. Prevents image forgery and duplicate uploads using RSA+AES hybrid encryption. Includes telephone-based login and admin verification.
Система проверки целостности файлов с помощью хэш-функции (SHA-256)
This project demonstrates the implementation of a simple user registration, login, and account removal system using Python 3.11 with a MySQL/MariaDB database. The system uses Object-Oriented Programming (OOP) principles and the MVC (Model-View-Controller) architecture. It utilizes the SQLAlchemy ORM to interact with the database...
An advanced hash cracking tool with support for multiple hashing algorithms, multithreading, and integration with online hash cracking APIs.
Desktop messenger for local networks. Features include user login, real-time chats, file sharing, and a custom WPF UI.
This Attendance System that uses facial recognition to automatically mark student attendance. It features admin and student logins, real-time face detection, attendance tracking, email reporting, and secure password management. Built with Python (Tkinter, OpenCV, and Pillow), it replaces manual attendance with automated facial verification.
Add a description, image, and links to the sha-256-hash topic page so that developers can more easily learn about it.
To associate your repository with the sha-256-hash topic, visit your repo's landing page and select "manage topics."