Browser extension - Uses chess moves to generate secure hashed passwords.
-
Updated
Feb 7, 2025 - JavaScript
Browser extension - Uses chess moves to generate secure hashed passwords.
Reconstruct files from a cryptographic hash
SHA-256 is a cryptographic hash function that generates a 256-bit (32-byte) hash value. It is widely used to ensure data integrity and security by creating a unique digital fingerprint for a given input, making it highly resistant to tampering or duplication.
Реализация базового Proof-of-Work блокчейна с поддержкой криптографических транзакций и верификацией цепочки
เพื่อเรียนรู้การ encryption decryption and digital signature เพื่อ Authentication ในการเลือกหัวหน้าทีมในการเลือกตั้ง พร้อมยังสามารถตรวจสอบหลักฐานการโหวตได้จาก Hash ข้อมูลทั้งหมด ด้วย SHA-512 เพื่อตรวจสอบคามถูกต้อง Data Integrity
Blockchain implementation in Golang
A secure password manager application to safely store, modify and remove an end-user’s data and personal information.
The method for creating a secured patient's data transfer using blockchain simulation on localhost. The simulation implements a cryptographic algorithm to ensure the security of the blockchain blocks. The cryptographic algorithm used is the SHA-256 (Secure Hash Algorithm 256-bit).
An advanced hash cracking tool with support for multiple hashing algorithms, multithreading, and integration with online hash cracking APIs.
Система проверки целостности файлов с помощью хэш-функции (SHA-256)
This Attendance System that uses facial recognition to automatically mark student attendance. It features admin and student logins, real-time face detection, attendance tracking, email reporting, and secure password management. Built with Python (Tkinter, OpenCV, and Pillow), it replaces manual attendance with automated facial verification.
This project demonstrates the implementation of a simple user registration, login, and account removal system using Python 3.11 with a MySQL/MariaDB database. The system uses Object-Oriented Programming (OOP) principles and the MVC (Model-View-Controller) architecture. It utilizes the SQLAlchemy ORM to interact with the database...
A c++ program that implements the Sha-256 hashing algorithm.
Pixshotcryption is an interactive cybersecurity tool that combines advanced encryption and steganography to securely hide messages in images. Ideal for confidential communication, securing intellectual property, and digital media integrity verification where data security is critical.
This project illustrates the use of Hash functions and Symmetric Ciphers to encrypt a private message and prevent access to foreign agents
SHA-256 hash generator in C++11
Add a description, image, and links to the sha-256-hash topic page so that developers can more easily learn about it.
To associate your repository with the sha-256-hash topic, visit your repo's landing page and select "manage topics."