Python module that wraps around hashlib and zlib to facilitate generating checksums / hashes of files and directories.
-
Updated
Mar 1, 2024 - Python
Python module that wraps around hashlib and zlib to facilitate generating checksums / hashes of files and directories.
Automated tool implementing Hash Length Extension Attack in MD4,MD5,SHA1,SHA256,SHA512 along with an example
A P2P file sharing system like Bit Torrent implemented using socket programming, multi-threading and SHA1 hashing. Users can share, download files from the group they belong to. Downloading is done in parallel with multiple pieces from multiple peers.
A simple and elegant open-source hash checker software.
Cryptography algorithms on C#
A P2P file sharing system implemented using socket programming, multi-threading and SHA1 hashing. Users can share, download files from the group they belong to. Downloading is done in parallel with multiple pieces from multiple peers.
Digital signature using RSA algorithm
This Python-based password cracking tool is developed by Itz Burhan Khan, an ethical hacker and programmer. It utilizes various hashing algorithms such as MD5, SHA1, SHA256, and SHA512 to crack hashed passwords.
Designed and built a basic TCP oriented Secure File Transfer Protocol (SFTP) with Diffie-Hellmann key exchange protocol, modified Caesar Cipher for encryption, DSS signature scheme and SHA1 for password hashing.
A full stack windows form application for sensitive image storing in encrypted format using symmetric key cryptography, and user data storing/securing using hash algorithms.
finding a string so that the SHA1-hash has 11 leading zeros
Implemented peer-to-peer multimedia file-sharing network using TCP. Each client can share and downloads multimedia through the custom torrent file from multiple peers via the central tracker. It also supports multithreaded client/server and tracker.
The sample project explores, how to sync data from the Google Fit app.
A python file which checks your password if it has been breached or safe to use securely without trusting website's https connection and also send only 5 hexadecimal characters of hash to server to make sure server is not compromised and get checks done on your own personal computer without trusting any other device.
Retrieve MD5, SHA1, and SHA256 hashes for files.
This is designed to create a hash for a download and compare it to the original hash provided by the source of the download.
برنامج باش للتحقق من تشفير MD5 وSHA1 وSHA256، للتحقق من مصداقية البرامج والملفات. Bash script checks MD5, SHA1, and SHA256 to verify the authenticity of programs and files.
FortiEDR Threat Intelligence Database. ThreatFox Threat Intelligence Database Integration with FortiEDR
Add a description, image, and links to the sha1-hash topic page so that developers can more easily learn about it.
To associate your repository with the sha1-hash topic, visit your repo's landing page and select "manage topics."