The hackers tool belt
-
Updated
Aug 6, 2018 - Python
The hackers tool belt
A curated list of "Visual Hashs" (Identicon, Avatar, Fractal, RandomArt and general Hash Visualization)
Cryptography Algorithms
UVerify makes blockchain technology accessible to everyone, regardless of prior experience. Effortlessly secure your file or text hashes on the Cardano blockchain.
TruthByte is a powerful and flexible command-line tool for verifying file integrity using multiple hash algorithms. Whether you're checking individual files or entire directories, TruthByte ensures your data hasn't been tampered with — perfect for validating downloads, backups, and sensitive files.
Evidex is a command-line tool designed to capture and verify the integrity of collections of files. It produces deterministic manifests and tamper-evident audit logs so that the state of digital evidence can be verified later
一个为中国学生设计的离线学术成绩单格式转换器,附带防篡改哈希存证与隐私保护,非官方认证工具-A local-first academic transcript formatter for Chinese students, with tamper-evident hashing and privacy protection. Not an official certification tool.-
Simple CLI tool to generate and verify cryptographic hashes.
A Python script that gets score, name, extension and distributors of a file hashes list.
Mini Cyber Toolkit v1.0 is a lightweight cybersecurity utility suite developed in pure Python, designed to provide essential security and networking tools in one compact desktop application. All modules are combined into a single file to ensure easy deployment, portability, and simple execution without complex setup. This version is optimized for W
Visualizing hashes with tree-based image generation
This repository aims to be a comprehensive landing page for uverify, offering insights into our use cases, team, and partners.
Blockchain-based product authenticity verification system using BNB Greenfield for decentralized storage and BSC for immutable hash verification. Features QR code generation, supply chain tracking, and tamper-proof document verification.
This is a simple command-line tool, used to verify the hash digest of a file.
A Claude Code skill that turns Claude into an expert UVerify developer assistant
A Python-based file integrity checker using SHA-256 to detect unauthorized modifications and ensure data security
Reference implementation for the Registered Probative Object (RPO) — deterministic evidential bundle (sealed JSON + preview + public hash)
SoftMonk.co is a cybersecurity-focused platform created to make software sourcing safe, compliant, and traceable. It was developed from years of enterprise IT experience. Unverified software repeatedly caused downtime and risk exposure.
A bonded file-transform agent governed by AgentGate's bond-and-slash model
A professional desktop tool for instantly calculating cryptographic hashes (MD5, SHA-1, SHA-256, SHA-512) of any file via drag & drop. Efficient, secure, and ready for everyday use by IT professionals and end users alike.
Add a description, image, and links to the hash-verification topic page so that developers can more easily learn about it.
To associate your repository with the hash-verification topic, visit your repo's landing page and select "manage topics."