The hackers tool belt
-
Updated
Aug 6, 2018 - Python
The hackers tool belt
A curated list of "Visual Hashs" (Identicon, Avatar, Fractal, RandomArt and general Hash Visualization)
Cryptography Algorithms
TruthByte is a powerful and flexible command-line tool for verifying file integrity using multiple hash algorithms. Whether you're checking individual files or entire directories, TruthByte ensures your data hasn't been tampered with — perfect for validating downloads, backups, and sensitive files.
Evidex is a command-line tool designed to capture and verify the integrity of collections of files. It produces deterministic manifests and tamper-evident audit logs so that the state of digital evidence can be verified later
Simple CLI tool to generate and verify cryptographic hashes.
Mini Cyber Toolkit v1.0 is a lightweight cybersecurity utility suite developed in pure Python, designed to provide essential security and networking tools in one compact desktop application. All modules are combined into a single file to ensure easy deployment, portability, and simple execution without complex setup. This version is optimized for W
A Python script that gets score, name, extension and distributors of a file hashes list.
Visualizing hashes with tree-based image generation
Blockchain-based product authenticity verification system using BNB Greenfield for decentralized storage and BSC for immutable hash verification. Features QR code generation, supply chain tracking, and tamper-proof document verification.
This is a simple command-line tool, used to verify the hash digest of a file.
SoftMonk.co is a cybersecurity-focused platform created to make software sourcing safe, compliant, and traceable. It was developed from years of enterprise IT experience. Unverified software repeatedly caused downtime and risk exposure.
A Python-based file integrity checker using SHA-256 to detect unauthorized modifications and ensure data security
Reference implementation for the Registered Probative Object (RPO) — deterministic evidential bundle (sealed JSON + preview + public hash)
A professional desktop tool for instantly calculating cryptographic hashes (MD5, SHA-1, SHA-256, SHA-512) of any file via drag & drop. Efficient, secure, and ready for everyday use by IT professionals and end users alike.
Script that detects changes by comparing cryptographic hashes.
efdl is an efficient downloading CLI app over HTTP(S)
A unified digital forensics platform that automates evidence collection, analysis, and reporting — enabling faster, reliable, and tamper-evident cyber investigations.
Provide essential cyber tools for password creation, hashing, IP info, port scanning, and system checks in a compact, easy-to-run Python toolkit.
Add a description, image, and links to the hash-verification topic page so that developers can more easily learn about it.
To associate your repository with the hash-verification topic, visit your repo's landing page and select "manage topics."