Library and command line tool to detect SHA-1 collision in a file
☆1,398Oct 30, 2025Updated 6 months ago
Alternatives and similar repositories for sha1collisiondetection
Users that are interested in sha1collisiondetection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆3,042May 12, 2026Updated last week
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,926Mar 14, 2017Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 9 years ago
- Porting Windows Dynamic Link Libraries to Linux☆4,483Apr 10, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Experimental High Assurance Cryptographic Library☆21Feb 1, 2016Updated 10 years ago
- An implementation of the TLS/SSL protocols☆4,721Updated this week
- OSS-Fuzz - continuous fuzzing for open source software.☆12,255May 15, 2026Updated last week
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,328Jul 27, 2021Updated 4 years ago
- How to backdoor Diffie-Hellman☆615Aug 20, 2016Updated 9 years ago
- Upspin: A framework for naming everyone's everything.☆6,400Jul 14, 2025Updated 10 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 8 years ago
- Virtual File System for Git: Enable Git at Enterprise Scale☆6,100Updated this week
- Memorable site for testing clients against bad SSL configs.☆3,011Apr 17, 2026Updated last month
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Multiplication using AVX512 and AVX512IFMA instructions☆24Nov 9, 2015Updated 10 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- like ~~grep~~ UBER, but for binaries☆1,771Jan 5, 2026Updated 4 months ago
- Wrangling Untrusted File Formats Safely☆4,751Updated this week
- The single instruction C compiler☆10,181May 29, 2024Updated last year
- Perceptual JPEG encoder☆12,937Apr 22, 2023Updated 3 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆194Mar 10, 2019Updated 7 years ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆801Feb 28, 2017Updated 9 years ago
- Advanced CPU-based password recovery utility☆2,198Sep 30, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Wannacry in-memory key recovery☆1,094Jun 3, 2017Updated 8 years ago
- Proof of Concepts (PE, PDF...)☆1,545Dec 22, 2024Updated last year
- A transparent and secure way to look up public keys.☆1,571Jul 5, 2021Updated 4 years ago
- The x86 processor fuzzer☆5,023Feb 20, 2024Updated 2 years ago
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,749Sep 23, 2016Updated 9 years ago
- A toolkit for building secure, portable and lean operating systems for containers☆8,613Mar 27, 2026Updated last month
- Build two PDFs that have different content but identical SHA1 sums.☆447Jan 31, 2025Updated last year
- Software U2F authenticator for macOS☆2,242Dec 14, 2020Updated 5 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Zstandard - Fast real-time compression algorithm☆27,136May 14, 2026Updated last week
- Some of my CTF solutions☆80May 13, 2019Updated 7 years ago
- The password hash Argon2, winner of PHC☆5,284Aug 6, 2024Updated last year
- Grumpy is a Python to Go source code transcompiler and runtime.☆10,505Jan 18, 2022Updated 4 years ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,350Apr 16, 2026Updated last month
- Personalized, user-focused recommendations for employee information security.☆2,005Aug 1, 2023Updated 2 years ago