Popular repositories Loading
-
Man--in-the--Middle-Attack
Man--in-the--Middle-Attack PublicA man-in-the-middle (MitM) attack is when an attacker intercepts communications between two parties either to secretly eavesdrop or modify traffic traveling between the two. Attackers might use Mit…
-
-
T-SHA
T-SHA PublicForked from Hritish-and-Aena-5/T-SHA
We've Proposed a method to verify fake documents using cryptography techniques, designed and modified original SHA-1 algorithm to make it collision free and harder to Brute Force.🐍
Python 1
-
Stimulating-Secure-Payment-System
Stimulating-Secure-Payment-System PublicThe program takes basic inputs like cc or debit card details.Generates hashes of all the inputs.Creates a Digital Signature.Now, uses RSA to encrypt the digital signature.
Python 1
-
If the problem persists, check the GitHub status page or contact support.