Generate two PDFs with different contents but identical SHA1 hashes.
☆22Mar 11, 2017Updated 9 years ago
Alternatives and similar repositories for sha1-collider
Users that are interested in sha1-collider are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Useful crypto tools for CTF☆40Jul 2, 2022Updated 3 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- ☆21Apr 5, 2025Updated last year
- Pcap search service for CTF final☆14Sep 5, 2020Updated 5 years ago
- Shielder's public proof of concepts collection☆33Jul 31, 2025Updated 8 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A small script for listing and exporting WhatsApp chats☆12May 4, 2020Updated 5 years ago
- Blocks the BlockAdBlock script☆20Jul 14, 2016Updated 9 years ago
- Web-based TOTP☆16Aug 24, 2021Updated 4 years ago
- CPU miner for Koto☆20Mar 12, 2018Updated 8 years ago
- Some new commands debug heap for peda☆100Apr 6, 2025Updated last year
- 義守管家線上雲端服務☆18Dec 28, 2016Updated 9 years ago
- ☆16Aug 1, 2016Updated 9 years ago
- A dump & load tool for etcd, which respects all key properties (including indexes) of public keys.☆24Jun 26, 2018Updated 7 years ago
- ☆113Oct 17, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Play 2048 in notepad.exe☆13Feb 16, 2015Updated 11 years ago
- PatchFuzz: Fuzzing for JavaScript Engine Incomplete Security Patches☆20Dec 17, 2025Updated 3 months ago
- ☆16Jun 6, 2021Updated 4 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- Search files for high entropy strings.☆25Nov 20, 2020Updated 5 years ago
- browser based dynamic fuzzer☆15Dec 8, 2022Updated 3 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- Wordpress Two-factor Authentication Brute-forcer☆19Oct 22, 2019Updated 6 years ago
- ☆16Mar 26, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Python Time Based Authentication Attack Tool☆21Apr 20, 2021Updated 4 years ago
- Attack-defense platform☆27Jun 26, 2019Updated 6 years ago
- AGV☆14Aug 29, 2015Updated 10 years ago
- Docker based high interaction honeypot☆10May 7, 2018Updated 7 years ago
- esa API v1 client library, written in Golang☆18May 13, 2019Updated 6 years ago
- Bot to anonymously send E2EE messages over Signal to a subscriber list.☆10Apr 5, 2026Updated last week
- ☆36Apr 29, 2025Updated 11 months ago
- Wasmtime(WebAssembly Runtime) Plugins and C# Bridge for Unity☆10Jan 26, 2024Updated 2 years ago
- Implementation of the ATProtocol client spec in Elixir.☆17Nov 18, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Decode traffic of PokemonGo using request/response dump☆20Jul 16, 2016Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆37Jun 24, 2015Updated 10 years ago
- A rework plugin to read and inline css via @import☆23Oct 14, 2020Updated 5 years ago
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- Security audit tool for Encrypt.to☆14May 2, 2015Updated 10 years ago
- DiffCSP: Finding Browser Bugs in Content Security Policy Enforcement through Differential Testing☆17Feb 27, 2023Updated 3 years ago
- JavaScript Obfuscation Tool☆18Oct 4, 2019Updated 6 years ago