50 years of hashing, CRC32, MD5, SHA, SHA-256
-
Updated
Sep 19, 2024 - Visual Basic 6.0
50 years of hashing, CRC32, MD5, SHA, SHA-256
Docker container with utilities to compute hashes (CRC32, MD5, SHA-1, SHA-256, SHA-512, Argon2...).
Pure UnrealScript SSL/TLS implementation and cryptography utilities based on BearSSL. Work in progress.
The official repository of the FlutCrack app 🎯
SHA-2 (Secure Hash Algorithm 2), which includes SHA-256, is among the most widely used hashing algorithms today
A basic implementation of RSA for Encryption/Decryption and SHA-1 for Hashing using Java, where upon running the program; the user would be prompted to select either one of these methods, then output the result based on the user's choice and input.
SHA implementation in C#
MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analyzes headers, APIs, and strings, giving quick insights for threat detection.
Python utility which will recursively scan one or more given directories for duplicate files.
A JavaScript/TypeScript implementation of the complete Secure Hash Standard (SHA) family (SHA-1, SHA-224/256/384/512, SHA3-224/256/384/512, SHAKE128/256, cSHAKE128/256, and KMAC128/256) with HMAC.
Encrypted chat using File System Watcher, Foursquare Cipher, LEA Cipher, PCBC cipher mode and SHA 1 cryptographic hash .
Add a description, image, and links to the sha-1 topic page so that developers can more easily learn about it.
To associate your repository with the sha-1 topic, visit your repo's landing page and select "manage topics."