Python module that wraps around hashlib and zlib to facilitate generating checksums / hashes of files and directories.
-
Updated
Mar 1, 2024 - Python
Python module that wraps around hashlib and zlib to facilitate generating checksums / hashes of files and directories.
A P2P file sharing system like Bit Torrent implemented using socket programming, multi-threading and SHA1 hashing. Users can share, download files from the group they belong to. Downloading is done in parallel with multiple pieces from multiple peers.
Implemented peer-to-peer multimedia file-sharing network using TCP. Each client can share and downloads multimedia through the custom torrent file from multiple peers via the central tracker. It also supports multithreaded client/server and tracker.
A simple and elegant open-source hash checker software.
Designed and built a basic TCP oriented Secure File Transfer Protocol (SFTP) with Diffie-Hellmann key exchange protocol, modified Caesar Cipher for encryption, DSS signature scheme and SHA1 for password hashing.
finding a string so that the SHA1-hash has 11 leading zeros
Automated tool implementing Hash Length Extension Attack in MD4,MD5,SHA1,SHA256,SHA512 along with an example
This is an android application that uses username-password and fingerprint authentication.
This is designed to create a hash for a download and compare it to the original hash provided by the source of the download.
Developed Peer-to-Peer multimedia file sharing network using TCP that allows uploading and downloading file using from multiple available seeders. It also supports multithreaded client/server and tracker
In a general sense, password cracking is the process of using an application program to identify and recover passwords from a computer or network resource. Let's make our own password md5 cracker.
HASHBRUTE adalah program Python3 sederhana yang dibuat untuk mencoba memecahkan hash password menggunakan metode brute force. HASHBRUTE mendukung beberapa algoritma hash, termasuk MD5, SHA1, SHA256, dan SHA512.
Cryptography algorithms on C#
theHasher> Create strong and unbreakable passwords by using Hash Functions. Generate Hashes and store them in txt files. Use the txt files as lists to execute Brute Force Attacks!
A python file which checks your password if it has been breached or safe to use securely without trusting website's https connection and also send only 5 hexadecimal characters of hash to server to make sure server is not compromised and get checks done on your own personal computer without trusting any other device.
A Java-based GUI application for encrypting/decrypting messages using the AES algorithm and signing/verifying messages using the DSA algorithm written for a class project.
The sample project explores, how to sync data from the Google Fit app.
Add a description, image, and links to the sha1-hash topic page so that developers can more easily learn about it.
To associate your repository with the sha1-hash topic, visit your repo's landing page and select "manage topics."