A hashlib-compliant pure-python implementation of SHA3
☆15Nov 8, 2021Updated 4 years ago
Alternatives and similar repositories for python-sha3
Users that are interested in python-sha3 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Matlab to Python converter☆13Aug 30, 2012Updated 13 years ago
- Rust interface to the Tor Control Protocol (TorCP)☆13Nov 1, 2021Updated 4 years ago
- A design for doing more private Signal groups using anonymous credentials based on algebraic MACs.☆13Dec 20, 2019Updated 6 years ago
- A fork of floodyberry's ed25519-donna modified to support the Ristretto prime-order group☆15Jan 15, 2021Updated 5 years ago
- The CYC1000 is the next generation of Arrow’s FPGA IoT/Maker boards based on the latest Intel FPGA family Cyclone 10 LP.☆10Jan 27, 2022Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Deterministic And Verifiable Randomness On Schnorr signatures☆12Nov 18, 2017Updated 8 years ago
- Reverse engineered the villager pypi package to github repo for analysis☆26Sep 20, 2025Updated 7 months ago
- A curated list of cryptography papers, articles, tutorials and howtos.☆10Feb 19, 2024Updated 2 years ago
- Sage implementation of the MAYO scheme☆15Feb 3, 2025Updated last year
- Beta Version of Cryptographic Fault Diagnosis Tool (VerFI)☆13Nov 6, 2020Updated 5 years ago
- Simple Python and Javascript Tools for generating valid BIP39 mnemonics☆19Jan 18, 2025Updated last year
- Easily create a BTC private key from a number☆11Jan 31, 2018Updated 8 years ago
- A prototype implementation of CertLedger☆11Apr 11, 2019Updated 7 years ago
- ☆12Jan 5, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Repository for BTC ATM. Goal: Python script that prints out a QR code with bitcoins worth $20☆10Dec 10, 2014Updated 11 years ago
- Tiny Bitcoin Library written in C, with nSPV added☆16Oct 28, 2020Updated 5 years ago
- Hack23 Public Information Security Management System:Security Through Transparency and Open Documentation Demonstrating Security Excellen…☆36Apr 19, 2026Updated 2 weeks ago
- Easy to use, multi-language BIP39 implementation for PHP☆12Aug 23, 2018Updated 7 years ago
- A 3D printed, case for the Sofle v2.0w keyboard☆16Jul 22, 2023Updated 2 years ago
- bitcoin tools ... #python #debian #package☆18Dec 21, 2010Updated 15 years ago
- multiple password 'asher using Python’s hashlib☆15Mar 24, 2021Updated 5 years ago
- Pure Java implementation of Ed25519☆21Mar 3, 2023Updated 3 years ago
- node bindings for cryptonight hashing☆17Jan 3, 2023Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Python Elliptical Curve Cryptography module☆21Jan 19, 2026Updated 3 months ago
- MiFare Classic 1k Smart Card MFOC Nested Attack☆16Feb 8, 2018Updated 8 years ago
- Android app for monitoring workers on give-me-coins.com mining pool.☆24Oct 24, 2020Updated 5 years ago
- 🐍 Mnemonic code for generating deterministic keys, BIP39☆19Jun 13, 2022Updated 3 years ago
- This package can recover broken private keys of bitcoin addresses by brute forcing in maximum 1 hour that have up to 5 characters missing…☆13Dec 9, 2018Updated 7 years ago
- Learn blockchain by building one, from consensus, to accounts, to transactions to storage and more☆16Dec 30, 2022Updated 3 years ago
- A boilerplate for the freeCodeCamp curriculum referenced in 'Data Protection with BCrypt'.☆23Jul 28, 2024Updated last year
- Exploit & Vulnerability Intelligence Repository☆24Jan 20, 2025Updated last year
- handling bitcoin address, including generating private keys from wif, sign/vefiry,serializing,HD keys and mnemonic seed☆24Jan 25, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- VerMFi: Verification tool for Masked implementations and Fault injection. Set of tools to evaluate resistance of secure hardware against …☆20Nov 18, 2019Updated 6 years ago
- Redteam, Pentest, APT's, Blogs, Talks, Slides links and notes☆27May 25, 2022Updated 3 years ago
- Extensions for using Scrapy on Amazon AWS☆32Dec 5, 2012Updated 13 years ago
- This arduino sketch uses the Digispark Attiny85 DigiKeyboard library to carry out a HID attack on a Windows 10 machine. The attack consis…☆18Jan 8, 2021Updated 5 years ago
- Visualize Bitcoin network transactions in real time☆70Aug 7, 2013Updated 12 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆30Apr 5, 2021Updated 5 years ago
- Skycoin exchange service☆15Dec 30, 2022Updated 3 years ago