Learn about cryptographic hash functions and how they protect digital signatures, file integrity, and software updates across digital assets.
Understand digital signatures and file integrity
SHAttered is a website dedicated to explaining cryptographic hash functions, which are essential for protecting digital signatures and verifying file integrity. Whether you’re curious about how your credit card transactions stay secure or want to know how software updates are protected, this site offers clear insights.
You’ll find easy-to-understand information about how these cryptographic standards work and why they matter for everything from electronic documents to open-source software. SHAttered is a useful resource if you’re interested in digital security or want to learn more about the technology that keeps your data safe.
Discover websites similar to Shattered.io. Optimized for ultra-fast loading.
Prosopo Procaptcha offers dynamic CAPTCHA and PoW tools to block bots, defend against cyber threats, and protect user privacy with GDPR compliance.
crxcavator scans Chrome extensions for security risks, helping you check extensions for privacy and safety before you install them.
Explore YARA's official documentation to learn how to identify and classify malware using pattern-based rules. Includes guides, modules, and API info.
Find updated, high-quality wordlists for security testing, content discovery, and subdomain enumeration across popular internet technologies.
Csper helps you build, deploy, and monitor Content Security Policies to protect your website and easily manage browser security reports.
Explore a comprehensive database of security vulnerabilities with details and guidance to help you identify, understand, and fix security issues in your software.
Scan and analyze any website or URL for suspicious or malicious activity. Get detailed security insights before you visit or interact with online links.
Scan your JavaScript projects for insecure libraries and vulnerabilities with this easy-to-use security tool. Keep your code safe and up to date.
ProjectDiscovery helps you find and manage real security vulnerabilities in your infrastructure, reducing false positives and streamlining your workflow.
Find Security Bugs offers a SpotBugs plugin to help you scan Java web apps for security vulnerabilities and improve code safety during development.
OpenSSL provides a widely used open-source toolkit for secure communications, offering encryption and privacy tools for everyone.
Report URI helps you monitor and manage website security by collecting and analyzing reports like Content Security Policy (CSP) and other web security events.
CVE catalogs and defines publicly disclosed cybersecurity vulnerabilities, helping you stay informed about security risks in software and hardware systems.
See how unique your browser is online and check your digital fingerprint to understand how easily you could be identified on the Internet.
SORBS helps block spam and unwanted email by providing real-time lists of suspicious servers and open relays to improve email security.
Submit your website to the HSTS preload list to ensure browsers always use HTTPS for your domain and boost your site's security and compliance.
Learn how to spot scams and protect yourself online with practical tips and guides focused on keeping Brits safe from phone, SMS, email, and web fraud.
Learn about Meltdown and Spectre vulnerabilities, their impact on computer security, and access research papers and resources for deeper understanding.
Learn how to use Content Security Policy (CSP) to protect your web applications from vulnerabilities like cross-site scripting with Google’s helpful guide.
Find detailed notes on software vulnerabilities, including technical info, remediation steps, and affected vendors, maintained by the CERT Coordination Center.