Craxk is a SINGLE AND NON-REPLICABLE Hash that uses data from the hardware where it is executed to form a hash that can only be reproduced by a single machine.

Related tags

MiscellaneousCraxk
Overview

Craxk

What is Craxk ?

Craxk is a UNIQUE AND NON-REPLICABLE Hash that uses data from the hardware where it is executed to form a hash that can only be reproduced by a single machine. That is, each Craxk hash is totally UNIQUE and impossible to break through a Reverse from a machine other than the host.

How is Craxk formed ?

The hash is formed using as part of the Shake and Blake working together. In addition, each hash uses unique and altered information from the hardware as mutants of the final hash.

Crack allows you to work with different amounts of bits:

  • Craxk 128
  • Craxk 256
  • Craxk 512

Install

pip install craxkhash

Usage

Class

Craxk is organized in classes. These classes work to define what kind of hash you want to use.

Classes are:

  • craxk_128
  • craxk_128_datemutation
  • craxk_128_seedmutation
  • craxk_256
  • craxk_256_datemutation
  • craxk_256_seedmutation
  • craxk_512
  • craxk_512_datemutation
  • craxk_512_seedmutation

From here all the arguments that are used could be explicit in bytes, string, or int.

craxk_128(data)

This is the class belonging to the 128-bit main hash, which uses only non-repeatable hardware information as a mutation.

craxk_128_datemutation(data)

This is the class belonging to the 128-bit hash in which you add the date mutation. What this means is that the hash will be mutated with non-replicable information from the hardware and also with the data of the current system date. The great utility of datemutation is to be able to create a hash that can only be replicated by the same hardware and on the same date.

For example: The hash of the string Hello World on machine 1 on 06/16/2021 will not be the same as the hash of the same string on 06/17/2021.

Without a doubt, datemutation opens a range of possibilities

craxk_128_seedmutation(data, seed=)

This is the class belonging to the 128-bit hash in which you add the mutation of a seed. What this means is that the hash will be mutated with non-replicable hardware information and also with the seed that you enter

seedmutation offers the possibility that the hash can only be obtained again by generating it from the same machine and with the specified seed.

The seed must not be a white space and can also be bytes, string, int or float

Functions

hash.update(data)

Update the hash object. Repeated calls are equivalent to a single call with the concatenation of all the arguments: m.update(a); m.update(b) is equivalent to m.update(a+b). In the case of seedmutation, only the data is updated, the seed will remain the same as before.

hash.replace()

Similary to update() only this function replaces the data and does not concatenate it like update() would. In the case of seedmutation, here you will need to specify the seed again using the seed= argument.

hash.digest()

Return the digest of the data. This is a bytes object of size digest_size which may contain bytes in the whole range from 0 to 255.

For example, to obtain the digest of the byte string b'Nobody inspects the spammish repetition':

Input

import craxkhash
x = craxkhash.craxk_128()
x.update(b'Nobody inspects')
x.update(b' the spammish repetition')
x.digest()

Output

> b'R\xda\xbe \x9a-\xb0&p\x07\x8e\xb2\xdb\x8b\x02N'

hash.hexdigest() It is the same as digest (), only the digest is returned as a double-length string object that only contains hexadecimal digits.

For example, to obtain the hexdigest of the byte string b'Nobody inspects the spammish repetition':

import craxkhash
x = craxkhash.craxk_128()
x.update(b'Nobody inspects')
x.update(b' the spammish repetition')
x.hexdigest()

Output

> 52dabe209a2db02670078eb2db8b024e

hash.digest_size

The size of the resulting hash in bytes.

hash.block_size

The internal block size of the hash algorithm in bytes.

Other information

Crack works in Python versions 2.7 onwards.

Currently only native Python libraries are used.

Those libraries are:

  • os
  • hashlib
  • subprocess
  • uuid
  • time
  • base64

It is very important to emphasize that this project is created by a programming enthusiast, in addition to the fact that the project is in continuous development

Created By ZaikoARG 🦇

GitHub Actions Version Updater Updates All GitHub Action Versions in a Repository and Creates a Pull Request with the Changes.

GitHub Actions Version Updater GitHub Actions Version Updater is GitHub Action that is used to update other GitHub Actions in a Repository and create

Maksudul Haque 42 Dec 22, 2022
because rico hates uuid's

terrible-uuid-lambda because rico hates uuid's sub 200ms response times! Try it out here: https://api.mathisvaneetvelde.com/uuid https://api.mathisvan

Mathis Van Eetvelde 2 Feb 15, 2022
Module-based cryptographic tool

Cryptosploit A decryption/decoding/cracking tool using various modules. To use it, you need to have basic knowledge of cryptography. Table of Contents

/SNESE_AR\ 33 Nov 27, 2022
A collection of useful functions for writers to analyze text/stories.

AuthorTools AuthorTools provides a multitude of functions for easily analyzing (your?) writing. AuthorTools is made especially for creative writers wi

1 Jan 14, 2022
Tools for collecting social media data around focal events

Social Media Focal Events The focalevents codebase provides tools for organizing data collected around focal events on social media. It is often diffi

Ryan Gallagher 80 Nov 28, 2022
Projects and assets from Wireframe #56

Wireframe56 Projects and assets from Wireframe #56 Make a Boulder Dash level editor in Python, pages 50-57, by Mark Vanstone. Code an homage to Bubble

Wireframe magazine 10 Sep 07, 2022
Rock-paper-scissors basic game in terminal with Python

piedra-papel-tijera Juego básico de piedra, papel o tijera en terminal con Python. El juego incluye: Nombre de jugador Número de veces a jugar Resulta

Isaías Flores 1 Dec 14, 2021
Quick script for automatically extracting syscall numbers for an OS

Syscalls-Extractor Quick script for automatically extracting syscall numbers for an OS $ python3 .\syscalls-extractor.py --help usage: syscalls-extrac

m0rv4i 54 Feb 10, 2022
A redesign of our previous Python World Cup, aiming to simulate the 2022 World Cup all the way from the qualifiers

A redesign of our previous Python World Cup, aiming to simulate the 2022 World Cup all the way from the qualifiers. This new version is designed to be more compact and more efficient and will reflect

Sam Counsell 1 Jan 07, 2022
Runtime fault injection platform by Daniele Rizzieri (2021)

GDBitflip [v1.04] Runtime fault injection platform by Daniele Rizzieri (2021) This platform executes N times a binary and during each execution it inj

Daniele Rizzieri 1 Dec 07, 2021
NBT-Project: This is a APP for building NBT's

NBT-Project This is an APP for building NBT's When using this you select a box on kit maker You input the name and enchant in there related boxes Then

1 Jan 21, 2022
create cohort visualizations for a subscription business

pycohort The main revenue generator for subscription businesses is recurring payments. There might be additional one-time offerings but the number of

Yalim Demirkesen 4 Sep 09, 2022
Traits for Python3

Do you like Python, but think that multiple inheritance is a bit too flexible? Are you looking for a more constrained way to define interfaces and re-use code?

121 Nov 15, 2022
Structured Exceptions for Python

XC: Structured exceptions for Python XC encourages a structured, disciplined approach to use of exceptions: it reduces the overhead of declaring excep

Bob Gautier 2 May 28, 2021
A simple tool made in Python language

Simple tool Uma simples ferramenta feita 100% em linguagem Python 💻 Requisitos: Python3 instalado em seu dispositivo Clonagem e acesso 📳 git clone h

josh washington 4 Dec 07, 2021
samples of neat code

NEAT-samples Some samples of code and config files for use with the NEAT-Python package These samples are largely copy and pasted, so if you

Harrison 50 Sep 28, 2022
Windows symbol tables for Volatility 3

Windows Symbol Tables for Volatility 3 This repository is the Windows Symbol Table storage for Volatility 3. How to Use $ git clone https://github.com

JPCERT Coordination Center 31 Dec 25, 2022
Telegram bot to upload media to telegra.ph

Telegraph @StarkTelegraphBot A star ⭐ from you means a lot to us ! Telegram bot to upload media to telegra.ph Usage Deploy to Heroku Tap on above butt

Stark Bots 24 Dec 29, 2022
JHBuild is a tool designed to ease building collections of source packages, called “modules”.

JHBuild README JHBuild is a tool designed to ease building collections of source packages, called “modules”. JHBuild was originally written for buildi

GNOME Github Mirror 46 Nov 22, 2022
Simple logger for Urbit pier size, with systemd timer template

urbit-piermon Simple logger for Urbit pier size, with systemd timer template. Syntax piermon.py -i [PATH TO PIER] -o [PATH TO OUTPUT CSV] systemd serv

1 Nov 07, 2021