Library and command line tool to detect SHA-1 collision in a file
☆1,389Oct 30, 2025Updated 4 months ago
Alternatives and similar repositories for sha1collisiondetection
Users that are interested in sha1collisiondetection are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- GPU code for the first SHA-1 collision attack and two freestart attacks☆36May 29, 2022Updated 3 years ago
- Project Wycheproof tests crypto libraries against known attacks.☆3,008Updated this week
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,923Mar 14, 2017Updated 9 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- Porting Windows Dynamic Link Libraries to Linux☆4,479Apr 10, 2025Updated 11 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Experimental High Assurance Cryptographic Library☆20Feb 1, 2016Updated 10 years ago
- An implementation of the TLS/SSL protocols☆4,698Updated this week
- How to backdoor Diffie-Hellman☆613Aug 20, 2016Updated 9 years ago
- OSS-Fuzz - continuous fuzzing for open source software.☆11,996Updated this week
- Wipe and reinstall a running Linux system via SSH, without rebooting. You know you want to.☆7,324Jul 27, 2021Updated 4 years ago
- Upspin: A framework for naming everyone's everything.☆6,403Jul 14, 2025Updated 8 months ago
- Authenticated Encryption Based on the Masked Even-Mansour (MEM) Construction☆28Apr 20, 2018Updated 7 years ago
- Memorable site for testing clients against bad SSL configs.☆2,990May 16, 2024Updated last year
- Virtual File System for Git: Enable Git at Enterprise Scale☆6,091Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- like ~~grep~~ UBER, but for binaries☆1,768Jan 5, 2026Updated 2 months ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Nov 9, 2015Updated 10 years ago
- GPU code for the first SHA-1 collision attack and two freestart attacks☆14Jun 22, 2020Updated 5 years ago
- The single instruction C compiler☆10,162May 29, 2024Updated last year
- Wrangling Untrusted File Formats Safely☆4,716Mar 2, 2026Updated 3 weeks ago
- Perceptual JPEG encoder☆12,950Apr 22, 2023Updated 2 years ago
- Wannacry in-memory key recovery☆1,089Jun 3, 2017Updated 8 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆194Mar 10, 2019Updated 7 years ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆801Feb 28, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Proof of Concepts (PE, PDF...)☆1,541Dec 22, 2024Updated last year
- Advanced CPU-based password recovery utility☆2,253Sep 30, 2022Updated 3 years ago
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,748Sep 23, 2016Updated 9 years ago
- The x86 processor fuzzer☆5,014Feb 20, 2024Updated 2 years ago
- A transparent and secure way to look up public keys.☆1,572Jul 5, 2021Updated 4 years ago
- A toolkit for building secure, portable and lean operating systems for containers☆8,601Updated this week
- Build two PDFs that have different content but identical SHA1 sums.☆444Jan 31, 2025Updated last year
- Software U2F authenticator for macOS☆2,243Dec 14, 2020Updated 5 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Zstandard - Fast real-time compression algorithm☆26,869Mar 17, 2026Updated last week
- Nameserver DNS poisoning attacks made easy☆525Feb 26, 2017Updated 9 years ago
- Some of my CTF solutions☆80May 13, 2019Updated 6 years ago
- The password hash Argon2, winner of PHC☆5,240Aug 6, 2024Updated last year
- Grumpy is a Python to Go source code transcompiler and runtime.☆10,527Jan 18, 2022Updated 4 years ago
- Personalized, user-focused recommendations for employee information security.☆2,004Aug 1, 2023Updated 2 years ago