Reconstruct files from a cryptographic hash
-
Updated
Dec 21, 2024 - Python
Reconstruct files from a cryptographic hash
Pixshotcryption is an interactive cybersecurity tool that combines advanced encryption and steganography to securely hide messages in images. Ideal for confidential communication, securing intellectual property, and digital media integrity verification where data security is critical.
The method for creating a secured patient's data transfer using blockchain simulation on localhost. The simulation implements a cryptographic algorithm to ensure the security of the blockchain blocks. The cryptographic algorithm used is the SHA-256 (Secure Hash Algorithm 256-bit).
Система проверки целостности файлов с помощью хэш-функции (SHA-256)
System that authenticates users via camera EXIF metadata and cryptographic signatures. Prevents image forgery and duplicate uploads using RSA+AES hybrid encryption. Includes telephone-based login and admin verification.
This Attendance System that uses facial recognition to automatically mark student attendance. It features admin and student logins, real-time face detection, attendance tracking, email reporting, and secure password management. Built with Python (Tkinter, OpenCV, and Pillow), it replaces manual attendance with automated facial verification.
LedgerLens is a full-stack, tamper-evident research notebook built with FastAPI, SQLModel, React, and Tailwind. It ensures data integrity using SHA-256 hash chaining, supports file attachments, real-time verification, Dockerized deployment, and includes tests with CI for reliability.
This project demonstrates the implementation of a simple user registration, login, and account removal system using Python 3.11 with a MySQL/MariaDB database. The system uses Object-Oriented Programming (OOP) principles and the MVC (Model-View-Controller) architecture. It utilizes the SQLAlchemy ORM to interact with the database...
An advanced hash cracking tool with support for multiple hashing algorithms, multithreading, and integration with online hash cracking APIs.
Add a description, image, and links to the sha-256-hash topic page so that developers can more easily learn about it.
To associate your repository with the sha-256-hash topic, visit your repo's landing page and select "manage topics."