cr-marcstevens / sha1collisiondetectionLinks
Library and command line tool to detect SHA-1 collision in a file
☆1,371Updated last year
Alternatives and similar repositories for sha1collisiondetection
Users that are interested in sha1collisiondetection are comparing it to the libraries listed below
Sorting:
- Project Wycheproof tests crypto libraries against known attacks.☆2,878Updated 2 weeks ago
- A transparent and secure way to look up public keys.☆1,573Updated 4 years ago
- Wannacry in-memory key recovery☆1,090Updated 8 years ago
- Auditing for TLS certificates.☆877Updated 2 years ago
- A (nearly) uncloneable repo☆408Updated 4 years ago
- TLS 1.3 Specification☆573Updated last month
- Keybase Filesystem (KBFS)☆1,204Updated 6 years ago
- ultrafast single TCP packet audio/visual experience☆1,402Updated last year
- A protocol for automating certificate issuance☆942Updated 6 years ago
- How to backdoor Diffie-Hellman☆613Updated 9 years ago
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆521Updated 3 years ago
- ACME Specification☆1,130Updated last year
- Memorable site for testing clients against bad SSL configs.☆2,967Updated last year
- A proposed standard that allows websites to define security policies.☆1,838Updated 2 years ago
- Top-level domain name registry service on Google Cloud Platform☆1,764Updated this week
- Advanced CPU-based password recovery utility☆2,171Updated 3 years ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,292Updated last month
- Build two PDFs that have different content but identical SHA1 sums.☆438Updated 8 months ago
- The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more se…☆502Updated 7 months ago
- An implementation of the Advanced Encryption Standard (AES) algorithm meant for study to go along with "A Stick Figure Guide to the Advan…☆425Updated 16 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆914Updated 8 years ago
- Chromium's HSTS preload list submission website.☆830Updated last month
- ROCA: Infineon RSA key vulnerability☆487Updated 2 years ago
- Sniffing browser history using HSTS☆935Updated 8 years ago
- Test DRAM for bit flips caused by the rowhammer problem☆983Updated 10 years ago
- Adiantum and HPolyC specification and test vectors☆476Updated last year
- like ~~grep~~ UBER, but for binaries☆1,747Updated 2 years ago
- Snapshot of North Korea's DNS data taken from zone transfers.☆1,737Updated 9 years ago
- Server side TLS Tools☆1,130Updated 9 months ago
- Proof of concept for CVE-2015-7547☆545Updated 9 years ago