Reconstruct files from a cryptographic hash
-
Updated
Dec 21, 2024 - Python
Reconstruct files from a cryptographic hash
The method for creating a secured patient's data transfer using blockchain simulation on localhost. The simulation implements a cryptographic algorithm to ensure the security of the blockchain blocks. The cryptographic algorithm used is the SHA-256 (Secure Hash Algorithm 256-bit).
Pixshotcryption is an interactive cybersecurity tool that combines advanced encryption and steganography to securely hide messages in images. Ideal for confidential communication, securing intellectual property, and digital media integrity verification where data security is critical.
This Attendance System that uses facial recognition to automatically mark student attendance. It features admin and student logins, real-time face detection, attendance tracking, email reporting, and secure password management. Built with Python (Tkinter, OpenCV, and Pillow), it replaces manual attendance with automated facial verification.
Система проверки целостности файлов с помощью хэш-функции (SHA-256)
This project demonstrates the implementation of a simple user registration, login, and account removal system using Python 3.11 with a MySQL/MariaDB database. The system uses Object-Oriented Programming (OOP) principles and the MVC (Model-View-Controller) architecture. It utilizes the SQLAlchemy ORM to interact with the database...
An advanced hash cracking tool with support for multiple hashing algorithms, multithreading, and integration with online hash cracking APIs.
Add a description, image, and links to the sha-256-hash topic page so that developers can more easily learn about it.
To associate your repository with the sha-256-hash topic, visit your repo's landing page and select "manage topics."