sha256
Here are 1,738 public repositories matching this topic...
Checks the integrity of some files. Useful for monitoring changes caused by ransomware.
-
Updated
Jul 6, 2022 - Shell
EncodePassword - A website to encode your password with a secret key. The password will be encoded in in sha256!
-
Updated
Oct 11, 2023 - JavaScript
Python CLI tool for SHA-256 file integrity verification — exports results to CSV for digital forensics
-
Updated
Dec 20, 2025 - Python
Deterministic canonical JSON hashing and tamper-evident hash-chain event log engine for TypeScript
-
Updated
Mar 3, 2026 - TypeScript
-
Updated
Jan 6, 2024 - Python
PixelKey is a Python package that provides a unique method for encrypting and decrypting messages. It derives the AES-GCM encryption key from the pixel data of an entire image, and then hides the AES nonce by masking it with a key derived from a specific region within that same image. This creates an encryption scheme where both the key and nonce a
-
Updated
Sep 14, 2025 - Python
This repository contains a hands-on practice lab for cracking Raw‑SHA256 password hashes using John the Ripper with the RockYou wordlist and rules.
-
Updated
Jan 29, 2026
Schema-driven Python audit tool for inspecting, validating, duplicate detection using Sha256 and exporting real-world data.
-
Updated
Feb 2, 2026 - Python
Adds hash generation directly to Windows Explorer context menus.
-
Updated
Feb 2, 2026
A fast and lightweight hash brute-forcer written in Go. Supports MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
-
Updated
Aug 17, 2025 - Go
-
Updated
Sep 29, 2025
-
Updated
Mar 19, 2026 - JavaScript
🛡️ SHA-256 based file tamper detection tool with GUI, email alerts & auto-scheduler | Cybersecurity Portfolio Project
-
Updated
Mar 21, 2026 - Python
Interactive Python tool for visualizing the avalanche effect in cryptographic hash functions (SHA-1, SHA-256, SHA-512, SHA-3). Built with Streamlit and Matplotlib to make hash diffusion observable and measurable.
-
Updated
Nov 6, 2025 - Python
Python cybersecurity tool to detect spoofed files using file signatures, hashes, and CSV reports.
-
Updated
Apr 27, 2026 - Python
Improve this page
Add a description, image, and links to the sha256 topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the sha256 topic, visit your repo's landing page and select "manage topics."