cr-marcstevens / sha1collisiondetectionLinks
Library and command line tool to detect SHA-1 collision in a file
☆1,382Updated 2 months ago
Alternatives and similar repositories for sha1collisiondetection
Users that are interested in sha1collisiondetection are comparing it to the libraries listed below
Sorting:
- Project Wycheproof tests crypto libraries against known attacks.☆2,962Updated last week
- TLS 1.3 Specification☆575Updated 3 weeks ago
- ultrafast single TCP packet audio/visual experience☆1,404Updated last year
- A transparent and secure way to look up public keys.☆1,573Updated 4 years ago
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆805Updated 8 years ago
- Wannacry in-memory key recovery☆1,091Updated 8 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- Auditing for TLS certificates.☆886Updated 2 years ago
- A (nearly) uncloneable repo☆418Updated 4 years ago
- A protocol for automating certificate issuance☆943Updated 6 years ago
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆521Updated 3 years ago
- Top-level domain name registry service on Google Cloud Platform☆1,776Updated this week
- ACME Specification☆1,129Updated last year
- Sniffing browser history using HSTS☆936Updated 8 years ago
- Memorable site for testing clients against bad SSL configs.☆2,978Updated last year
- Server side TLS Tools☆1,134Updated 11 months ago
- Keybase Filesystem (KBFS)☆1,204Updated 6 years ago
- ROCA: Infineon RSA key vulnerability☆490Updated 2 years ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆938Updated 3 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆917Updated 8 years ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,330Updated 4 months ago
- A proposed standard that allows websites to define security policies.☆1,846Updated 3 years ago
- A demo of overriding what's in a person's clipboard☆1,431Updated 2 years ago
- ☆1,330Updated 2 years ago
- Architectural privilege escalation on x86☆856Updated 7 years ago
- like ~~grep~~ UBER, but for binaries☆1,757Updated last week
- Automated wanadecrypt with key recovery if lucky☆797Updated 8 years ago
- Test DRAM for bit flips caused by the rowhammer problem☆989Updated 10 years ago
- Home to public development of NIST Special Publication 800-63-3: Digital Authentication Guidelines☆718Updated 4 months ago