ShadowHash is a comprehensive cryptographic platform designed to enhance data security and integrity. Built using Java for the backend and HTML/CSS for the frontend, it is hosted on GitHub and AWS Amplify. The platform offers cryptographic tools such as password security, encryption, decryption, hash generation, integrity verification, and threat detection. It integrates APIs like VirusTotal, HaveIBeenPwned, and Hackcheck Woventeams for breach detection and malware scanning.
Clone the repository and navigate to the project directory:
git clone https://github.com/AdityaBhatt3010/ShadowHash-All-in-One-Crypto-Solution.git
cd ShadowHash
- Email Breach Checker – Checks if an email was part of a data breach using the Hackcheck Woventeams API.
- Password Breach Checker – Uses HaveIBeenPwned API to verify if a password has been compromised.
- Password Generator – Generates strong passwords, including user-defined secure ones.
- Encryption Algorithms – Supports AES, 3DES, Blowfish, RSA, and a custom ShadowHash special encryption algorithm.
- Decryption Algorithms – Supports decryption for the above encryption methods.
- Hash Creator – Provides hashing algorithms (MD5, SHA-1, SHA-256) for data integrity.
- Hash Comparison Checker – Validates data integrity by comparing hash values.
- Virus Detector – Uses the VirusTotal API to scan files for potential malware.
- Frontend: HTML, CSS
- Backend: Initially Java, later transitioned to JavaScript (Vanilla JS, Express, Node.js)
- Hosting: AWS Amplify (integrated with GitHub for CI/CD)
- Libraries:
node-fetch
,crypto
,express-fileupload
,path
- APIs Used:
- Hackcheck Woventeams API (Email Breach Detection)
- HaveIBeenPwned API (Password Breach Checking)
- VirusTotal API (File Malware Detection)
- Requirements Analysis – Identified key security features needed.
- Design – Created system architecture, UI, and API integrations.
- Development
- Backend: Secure HTTP requests, password hashing, encryption/decryption.
- Frontend: User-friendly UI, responsive design.
- Testing – Unit, integration, and security testing.
- Deployment – Hosted on AWS Amplify with monitoring via AWS CloudWatch & SNS.
- Maintenance & Updates – Continuous monitoring and security updates.
- Successfully implemented key cryptographic functionalities.
- Seamless frontend-backend integration ensures a smooth user experience.
- Strong security protocols like SHA-1 hashing for password breach checks.
- Multi-layered encryption support for varied user needs.
- Real-time malware scanning via VirusTotal API.
Here are some screenshots of the ShadowHash platform:
ShadowHash is a powerful, all-in-one cryptographic security platform designed for password protection, data encryption, integrity verification, and malware detection. Its deployment on AWS Amplify with security enhancements ensures scalability, reliability, and real-time protection. The project continues to evolve with a focus on advanced cybersecurity measures.