Generate two PDFs with different contents but identical SHA1 hashes.
☆22Mar 11, 2017Updated 9 years ago
Alternatives and similar repositories for sha1-collider
Users that are interested in sha1-collider are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Useful crypto tools for CTF☆40Jul 2, 2022Updated 3 years ago
- Write-ups for CTF challenges.☆15May 30, 2021Updated 4 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Pcap search service for CTF final☆14Sep 5, 2020Updated 5 years ago
- Shielder's public proof of concepts collection☆33Jul 31, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Web-based TOTP☆16Aug 24, 2021Updated 4 years ago
- WWWを再構築するぞ!!!☆15Aug 27, 2018Updated 7 years ago
- CPU miner for Koto☆20Mar 12, 2018Updated 8 years ago
- Some new commands debug heap for peda☆100Apr 6, 2025Updated 11 months ago
- 義守管家線上雲端服務☆18Dec 28, 2016Updated 9 years ago
- ☆16Aug 1, 2016Updated 9 years ago
- A dump & load tool for etcd, which respects all key properties (including indexes) of public keys.☆24Jun 26, 2018Updated 7 years ago
- ☆113Oct 17, 2017Updated 8 years ago
- Micro texteditor☆15Aug 3, 2016Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Print your message as a part of various Japanese internet memes.☆29Apr 11, 2024Updated last year
- A Formal Verification of Algorithm W☆17Mar 10, 2021Updated 5 years ago
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- 🐝Benedu Font is not so good to read some word...☆11Jun 6, 2018Updated 7 years ago
- [Deprecated] Library for SAKURA Cloud API with Go☆18Feb 25, 2023Updated 3 years ago
- esa on Alfred workflow☆18Jan 28, 2018Updated 8 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- Search files for high entropy strings.☆25Nov 20, 2020Updated 5 years ago
- browser based dynamic fuzzer☆15Dec 8, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- DIY Stackmat Timer for cubing☆11Oct 18, 2020Updated 5 years ago
- Bleichenbachers "Million message attack" on RSA in Python☆30Apr 5, 2021Updated 4 years ago
- A simple XSS challenge example using Zombie.js☆10Apr 8, 2015Updated 10 years ago
- なさそう☆11Apr 30, 2024Updated last year
- Attack-defense platform☆27Jun 26, 2019Updated 6 years ago
- Docker based high interaction honeypot☆10May 7, 2018Updated 7 years ago
- esa API v1 client library, written in Golang☆18May 13, 2019Updated 6 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Bot to anonymously send E2EE messages over Signal to a subscriber list.☆11Feb 10, 2026Updated last month
- DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing☆15Feb 27, 2023Updated 3 years ago
- ☆36Apr 29, 2025Updated 10 months ago
- A simple implementation of an "Error" [pseudo-]monad for Ruby.☆16Dec 29, 2015Updated 10 years ago
- Wasmtime(WebAssembly Runtime) Plugins and C# Bridge for Unity☆10Jan 26, 2024Updated 2 years ago
- mikutter TweetDeck plugin☆12Aug 26, 2018Updated 7 years ago
- Edison BSP - https://communities.intel.com/docs/DOC-23242☆11Apr 4, 2015Updated 10 years ago