Simple implementation of SHA1 in C
☆12Apr 26, 2017Updated 8 years ago
Alternatives and similar repositories for sha1
Users that are interested in sha1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An opinion dynamic tracing model on dataset I☆17Dec 17, 2019Updated 6 years ago
- Vaccine Attitude Detection☆17Sep 16, 2022Updated 3 years ago
- This repository has been archived. See https://github.com/chaos-mesh/go-sqlancer for the new version☆12May 12, 2020Updated 5 years ago
- 趣闻-ReactNative 版☆29Jun 26, 2018Updated 7 years ago
- Simple HTTP/SSL Proxy written in C. Combination of code from micro_proxy and tinyhttpd - it does not use inetd as does the original micro…☆13Dec 4, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- web message board☆18May 9, 2016Updated 9 years ago
- fuzzing for config☆12Sep 15, 2020Updated 5 years ago
- A Reduction Tool for SQL Bachelor's thesis of Jonas Müntener☆16Oct 15, 2024Updated last year
- Golang user signal based package for collecting pprof information☆12Apr 1, 2016Updated 9 years ago
- socks5 by hawk☆12Jul 29, 2019Updated 6 years ago
- openresty技能实践代码☆21Feb 3, 2018Updated 8 years ago
- Winform application for sending and receiving APDU command/response☆10Mar 19, 2019Updated 7 years ago
- ☆13Apr 10, 2025Updated 11 months ago
- ☆16Jun 9, 2013Updated 12 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- OpenAdv系统总览☆22Aug 17, 2018Updated 7 years ago
- A creeper used to catch concerns and fans in sina microblog. It can imitate login. When encountered with verification code,it shall down …☆21Mar 10, 2016Updated 10 years ago
- Easwy's share files☆97Feb 28, 2026Updated 3 weeks ago
- A basic repository for a Clang-based tool, with CMake integration.☆10Sep 22, 2023Updated 2 years ago
- AVX2 Chacha implementation☆16Nov 23, 2013Updated 12 years ago
- A tool for testing SMT solvers for incompleteness bugs☆17Oct 12, 2022Updated 3 years ago
- Fuzzy Data Benchmark☆17Feb 8, 2024Updated 2 years ago
- Automated Testing Tool for Graph-processing Systems.☆12Jul 26, 2025Updated 8 months ago
- A WIP compiler for a functional language. Very incomplete!☆16Nov 6, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- A program that descrypts C type declarations. Implemented as an exercise for "Expert C Programming" book.☆12Aug 16, 2015Updated 10 years ago
- The complement to Android's mkbootimg☆24Sep 23, 2013Updated 12 years ago
- CRC-32 checksum implemented in pure Lua☆22Dec 4, 2011Updated 14 years ago
- Basically the C programming language peppered with my preferences☆12Jun 12, 2025Updated 9 months ago
- ☆23Feb 18, 2025Updated last year
- Vectorized intersections (research code)☆16Jan 13, 2017Updated 9 years ago
- A simple set of code to enable JNI Native crashes to be caught by java and throw a meaningfull exception☆16Sep 27, 2013Updated 12 years ago
- A lightweight tool for detecting bugs on Graph Database Management Systems☆15Jan 9, 2024Updated 2 years ago
- Ascii85 encoder/decoder written in C with no memory allocation, no whitespace tolerance.☆11Jun 24, 2020Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆21Mar 1, 2026Updated 3 weeks ago
- Velo is a tiny language (STLC + Hutton's Razor with Bools) to showcase & explore efficient verified implementations in Idris2.☆16Apr 3, 2023Updated 2 years ago
- ☆17Feb 18, 2026Updated last month
- NDN-Opp: implementation of Named-Data Networking on Opportunistic Networks. Includes support for intermittent connectivity, opportunistic…☆10Apr 30, 2018Updated 7 years ago
- a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 …☆84May 13, 2019Updated 6 years ago
- Datalog Engines OPtimization Tester.☆13Jan 18, 2024Updated 2 years ago
- Bypass CORS restrictions Client Side.☆18Aug 24, 2024Updated last year