Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security sha
security
x
sha
x
37 search results found
Dockerfile
⭐
3,219
Dockerfile best-practices for writing production-worthy Docker images.
Wolfssl
⭐
2,102
The wolfSSL library is a small, fast, portable implementation of TLS/SSL for embedded devices to the cloud. wolfSSL supports up to TLS 1.3!
Jose Jwt
⭐
891
Ultimate Javascript Object Signing and Encryption (JOSE), JSON Web Token (JWT) and Json Web Keys (JWK) Implementation for .NET and .NET Core
Snow
⭐
821
A Rust implementation of the Noise Protocol Framework
Bcrypt.net
⭐
760
BCrypt.Net - Bringing updates to the original bcrypt package
Encryptpad
⭐
401
Minimalist secure text editor and binary encryptor that implements RFC 4880 Open PGP format: symmetrically encrypted, compressed and integrity protected. The editor can protect files with passwords, key files or both.
Wrapper Validation Action
⭐
243
Gradle Wrapper Validation Action
Threatpinchlookup
⭐
236
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Password_exposed
⭐
199
🔒 Password Exposed Helper Function - Check if a password has been exposed in a data breach.
Nfwebcrypto
⭐
198
Web Cryptography API Polyfill
Sha3sum
⭐
164
[Feature complete] SHA-3 and Keccak checksum utility
Dtls
⭐
62
Datagram Transport Layer Security (DTLS) client.
Pin Github Action
⭐
59
Pin your GitHub actions to a specific hash
Pbkdf2 Scala
⭐
48
PBKDF2 implementation in Scala
Jwt
⭐
47
JSON Web Token implementation for .Net & .Net Core
Ska
⭐
40
Sign data using symmetric-key algorithm encryption. Validate signed data and identify possible validation errors. Uses sha-(1, 224, 256, 385 and 512)/hmac for signature encryption. Custom hash algorithms are allowed. Useful shortcut functions for signing (and validating) dictionaries and URLs.
Pwnedpasswords
⭐
32
A Python Library and CLI for the Pwned Passwords v2 API
Autocsp
⭐
28
Tool to generate a valid Content Security Policy headers, integrity hashes and inline hashes for your current webpage
Crypthash Net
⭐
28
CryptHash.NET is a .NET multi-target library to encrypt/decrypt/hash/encode/decode strings and files, with an optional .NET Core multiplatform console utility.
Memorymapper
⭐
26
Lightweight library which allows the ability to map both native and managed assemblies into memory by either using process injection of a process specified by the user or self-injection.
Deadhash Android
⭐
26
DeadHash for Android
Tabbyssl
⭐
23
Previously MesaLink, TabbySSL is an OpenSSL compatibility layer for the Rust TLS stack.
Django Sri
⭐
17
Subresource Integrity for Django
Httpsadapterdemo
⭐
17
Keccakj
⭐
13
Java implementation of FIPS 202, SHA3-xxxx, SHAKE128, SHAKE256
Jgdms
⭐
13
Infrastructure for providing secured micro services, that are dynamically discoverable and searchable over ipv6 networks
Amaterasu
⭐
11
Lightweight licensing library for .NET applications which allows the managing of licenses via web based scripts and on-the-fly code compilation.
Django Pwnedpasswords Validator
⭐
10
Django password validator that checks for passwords in known data breaches.
Tsha
⭐
10
I've Proposed a method to verify fake documents using cryptography techniques, designed and modified original SHA-1 algorithm to make it collision free and harder to Brute Force.🐍
Openvpn Installer For Linux
⭐
9
OpenVPN installer written in Bash
Java Pbkdf2
⭐
9
PKCS #5 Password Based Key Derivation Function 2 for Java(TM)
Encryption And Decryption Programs
⭐
8
This repository contains a collection of ciphers and encryption applications implemented in Python. The ciphers include classic ciphers like Caesar Cipher, Vigenere Cipher, Playfair Cipher, etc. The encryption applications include tools for encryption and decryption of messages, password generators, and more.
Scancore
⭐
8
A high performance single thread command-line virus scanner written in PHP.
Sso Service
⭐
6
基于 Spring Security OAuth2 的单点登录系统
Secondfactor
⭐
6
🔑️ Two-Factor Authenticator for Windows
Php Secure And Hashing Pw Prevention Rainbow Table
⭐
5
Xss, sql-injection, php, login, Csrf, security, rainbow table, encryption, salt
Cryptdo
⭐
5
a simple wrapper for commands which access sensitive files
Related Searches
Security Vulnerabilities (11,840)
Laravel Security (11,580)
Php Security (10,611)
Html Security (2,284)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
Amazon Web Services Security (874)
C Security (845)
1-37 of 37 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.