cr-marcstevens / sha1collisiondetectionLinks
Library and command line tool to detect SHA-1 collision in a file
☆1,361Updated 11 months ago
Alternatives and similar repositories for sha1collisiondetection
Users that are interested in sha1collisiondetection are comparing it to the libraries listed below
Sorting:
- A (nearly) uncloneable repo☆407Updated 4 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆2,850Updated this week
- A transparent and secure way to look up public keys.☆1,572Updated 4 years ago
- TLS 1.3 Specification☆568Updated 3 weeks ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆807Updated 8 years ago
- Auditing for TLS certificates.☆875Updated last year
- ultrafast single TCP packet audio/visual experience☆1,401Updated 11 months ago
- How to backdoor Diffie-Hellman☆613Updated 8 years ago
- Adiantum and HPolyC specification and test vectors☆475Updated last year
- Wannacry in-memory key recovery☆1,087Updated 8 years ago
- A protocol for automating certificate issuance☆939Updated 6 years ago
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆521Updated 2 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,919Updated 8 years ago
- BLAKE2 official implementations☆669Updated 2 years ago
- Sniffing browser history using HSTS☆933Updated 7 years ago
- Keybase Filesystem (KBFS)☆1,208Updated 6 years ago
- Top-level domain name registry service on Google Cloud Platform☆1,746Updated this week
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,264Updated 11 months ago
- Memorable site for testing clients against bad SSL configs.☆2,947Updated last year
- A Chrome Extension to help protect against phishing attacks.☆315Updated 3 months ago
- A proposed standard that allows websites to define security policies.☆1,830Updated 2 years ago
- Unicode's answer to Base64☆2,157Updated 2 months ago
- ACME Specification☆1,131Updated last year
- Home to public development of NIST Special Publication 800-63-3: Digital Authentication Guidelines☆717Updated 2 years ago
- An implementation of the Advanced Encryption Standard (AES) algorithm meant for study to go along with "A Stick Figure Guide to the Advan…☆423Updated 15 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆931Updated 2 years ago
- Plugin for sudo that requires another human to approve and monitor privileged sudo sessions☆1,256Updated last year
- A simple demo of phishing by abusing the browser autofill feature☆1,482Updated 4 years ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,735Updated 8 years ago