cr-marcstevens / sha1collisiondetectionLinks
Library and command line tool to detect SHA-1 collision in a file
☆1,381Updated last month
Alternatives and similar repositories for sha1collisiondetection
Users that are interested in sha1collisiondetection are comparing it to the libraries listed below
Sorting:
- Project Wycheproof tests crypto libraries against known attacks.☆2,924Updated last week
- E2EMail is a simple Chrome application - a Gmail client that exchanges OpenPGP mail.☆805Updated 8 years ago
- A (nearly) uncloneable repo☆415Updated 4 years ago
- ultrafast single TCP packet audio/visual experience☆1,404Updated last year
- TLS 1.3 Specification☆574Updated last week
- A transparent and secure way to look up public keys.☆1,572Updated 4 years ago
- Auditing for TLS certificates.☆884Updated 2 years ago
- TLDR (TLD Records) is a continually updated DNS archive of zone transfer attempts again all existing TLD nameservers as well as the root …☆521Updated 3 years ago
- Wannacry in-memory key recovery☆1,091Updated 8 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.☆1,919Updated 8 years ago
- Take security by obscurity to the next level (this is a bad idea, don't really use this please)☆939Updated 3 years ago
- A proposed standard that allows websites to define security policies.☆1,844Updated 3 years ago
- ☆1,330Updated 2 years ago
- Sniffing browser history using HSTS☆936Updated 8 years ago
- Server side TLS Tools☆1,134Updated 11 months ago
- Home to public development of NIST Special Publication 800-63-3: Digital Authentication Guidelines☆718Updated 3 months ago
- Vendor Response Matrix for KRACK WPA2 (Key Reinstallation Attack)☆754Updated 7 years ago
- Top-level domain name registry service on Google Cloud Platform☆1,771Updated this week
- Keybase Filesystem (KBFS)☆1,204Updated 6 years ago
- A protocol for automating certificate issuance☆943Updated 6 years ago
- Poc, Presentation of Monitor OSD Exploitation, and shenanigans of high quality.☆917Updated 8 years ago
- A demo of overriding what's in a person's clipboard☆1,431Updated last year
- Memorable site for testing clients against bad SSL configs.☆2,975Updated last year
- ROCA: Infineon RSA key vulnerability☆490Updated 2 years ago
- BLAKE2 official implementations☆684Updated 2 years ago
- A ssh server that knows who you are. $ ssh whoami.filippo.io☆2,300Updated 3 months ago
- Proof of concept for CVE-2015-7547☆544Updated 9 years ago
- LGTM is a simple pull request approval system [ARCHIVE]☆990Updated 7 years ago
- The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more se…☆508Updated this week