Topic: sha1-hash Goto Github
Some thing interesting about sha1-hash
Some thing interesting about sha1-hash
sha1-hash,sha1 implement by c language
User: 2239559319
sha1-hash,Fast and multi-threaded downloader for ';--have i been pwned? SHA1 password hashes.
User: 607011
sha1-hash,This web application will encrypt any text using the secured Hashed algorithm like MD5,SHA1,Repmed160 alogorithm
User: abirsince92
sha1-hash,A P2P file sharing system implemented using socket programming, multi-threading and SHA1 hashing. Users can share, download files from the group they belong to. Downloading is done in parallel with multiple pieces from multiple peers.
User: akshayxml
sha1-hash,Create and compare hashes of .exe and .dll files in order to detect updates
User: alescher
sha1-hash,Hashr helps generate hashed and stronger version of your password for your accounts, apps and/or sites that requires credentials.
User: arjayem
sha1-hash,Applied Cryptography Utilities
User: ashkanm96
sha1-hash,hash generator to hash your normal string
User: ashwin697
sha1-hash,HashCrack is a powerful and simple tool designed for cracking any type of hash using efficient wordlist attack
User: aymenbrahimdjelloul
sha1-hash,Cryptography algorithms on C#
User: bedirhanguner
sha1-hash,The sample project explores, how to sync data from the Google Fit app.
User: braver-tool
sha1-hash,A P2P file sharing system like Bit Torrent implemented using socket programming, multi-threading and SHA1 hashing. Users can share, download files from the group they belong to. Downloading is done in parallel with multiple pieces from multiple peers.
User: chirag-shilwant
sha1-hash,A demonstration of a (SHA1) length extension attack, with instructions
User: dan-q
sha1-hash,RSA cryptosystem with SHA1 signature
User: disabel1a
sha1-hash,FortiEDR Threat Intelligence Database. ThreatFox Threat Intelligence Database Integration with FortiEDR
User: drpwner
Home Page: https://threatfox.abuse.ch/
sha1-hash,Automated tool implementing Hash Length Extension Attack in MD4,MD5,SHA1,SHA256,SHA512 along with an example
User: eid3t1c
sha1-hash,Secure Hash Algorithm library implementation in C
User: elfurioux
sha1-hash,HASHBRUTE adalah program Python3 sederhana yang dibuat untuk mencoba memecahkan hash password menggunakan metode brute force. HASHBRUTE mendukung beberapa algoritma hash, termasuk MD5, SHA1, SHA256, dan SHA512.
User: fii14
sha1-hash,Read, hash, and store git objects with Node JS.
User: gbroques
sha1-hash,Program narzędziowy wykonujący zapytanie na bazie danych, zapisujący wynik do pliku .xls oraz dodający do nazwy pliku wygenerowany hasz SHA1.
User: grzegorzokon
sha1-hash,In a general sense, password cracking is the process of using an application program to identify and recover passwords from a computer or network resource. Let's make our own password md5 cracker.
User: hr21don
Home Page: https://hr21don.github.io/Password-Cracking-Dictionary-/
sha1-hash,#️⃣ 👀👆🏽Query and Orchestrate the CIRCL Hash Lookup Service
User: hrbrmstr
sha1-hash,This Python-based password cracking tool is developed by Itz Burhan Khan, an ethical hacker and programmer. It utilizes various hashing algorithms such as MD5, SHA1, SHA256, and SHA512 to crack hashed passwords.
User: itz-burhan-khan
sha1-hash,An advanced hash cracking tool with support for multiple hashing algorithms, multithreading, and integration with online hash cracking APIs.
User: jubinjacob03
sha1-hash,A python file which checks your password if it has been breached or safe to use securely without trusting website's https connection and also send only 5 hexadecimal characters of hash to server to make sure server is not compromised and get checks done on your own personal computer without trusting any other device.
User: knownbymanoj
sha1-hash,Generate a SHA-1 hash for any string input.
User: kouisamine
Home Page: https://tools.waytolearnx.com/sha1-generator
sha1-hash,Uses the haveibeenpwned API [https://haveibeenpwned.com/API/v3] to check if passwords have been breached or not.
User: kristoffhernan
sha1-hash,Understanding SHA1 Hashing Algorithm's implementation using Javascript
User: lakshmishreya-bapatuyeruguti
sha1-hash,Python module that wraps around hashlib and zlib to facilitate generating checksums / hashes of files and directories.
User: leonidessaguisagjr
Home Page: https://pypi.org/project/filehash/
sha1-hash,Implemented peer-to-peer multimedia file-sharing network using TCP. Each client can share and downloads multimedia through the custom torrent file from multiple peers via the central tracker. It also supports multithreaded client/server and tracker.
User: likhithagaddi
sha1-hash,برنامج باش للتحقق من تشفير MD5 وSHA1 وSHA256، للتحقق من مصداقية البرامج والملفات. Bash script checks MD5, SHA1, and SHA256 to verify the authenticity of programs and files.
User: lmuhammed
sha1-hash,A small tool which generates SHA1 or SHA256 hashes of files.
User: lsnelinski
sha1-hash,implementation of sha1 hash function algorithm with python pure
User: m-taghizadeh
Home Page: http://m-taghizadeh.ir
sha1-hash,This is designed to create a hash for a download and compare it to the original hash provided by the source of the download.
User: matthewnobes
sha1-hash,finding a string so that the SHA1-hash has 11 leading zeros
User: mkud
sha1-hash,Digital signature using RSA algorithm
User: n1ghtf1re
sha1-hash,Show file hash for one or multiple files. SHA1 SHA256 SHA384 SHA512
User: noarche
sha1-hash,Designed and built a basic TCP oriented Secure File Transfer Protocol (SFTP) with Diffie-Hellmann key exchange protocol, modified Caesar Cipher for encryption, DSS signature scheme and SHA1 for password hashing.
User: priyansh2
sha1-hash,theHasher> Create strong and unbreakable passwords by using Hash Functions. Generate Hashes and store them in txt files. Use the txt files as lists to execute Brute Force Attacks!
User: r3dsh3rl0ck
sha1-hash,In this repository, I've gathered a collection of cryptographic algorithms that I've learned during my college years and implemented for both learning and practical purposes.
User: rani-abha
sha1-hash,Encryption terminal-based program to encrypt-decrypt files and directories using an auto-generated key
User: robertopatino1
sha1-hash,A full stack windows form application for sensitive image storing in encrypted format using symmetric key cryptography, and user data storing/securing using hash algorithms.
User: saahen-sriyan-mishra
sha1-hash,Retrieve MD5, SHA1, and SHA256 hashes for files.
User: samuel-lucas6
Home Page: https://sourceforge.net/projects/hash-me/
sha1-hash,A simple and elegant open-source hash checker software.
Organization: techlearnersinc
Home Page: https://hash-checker.techlearners.xyz
sha1-hash,Dosyaların MD5 ve SHA-1 değerlerini gösteren ve aranan hash değeriyle karşılaştırabilen program.
User: umut-d
Home Page: https://umutd.com/programlar/dosya-hash-degeri-hesaplayici
A declarative, efficient, and flexible JavaScript library for building user interfaces.
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google ❤️ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.