anishathalye / neural-hash-collider
Preimage attack against NeuralHash π£
β669Updated 2 years ago
Alternatives and similar repositories for neural-hash-collider:
Users that are interested in neural-hash-collider are comparing it to the libraries listed below
- Convert Apple NeuralHash model for CSAM Detection to ONNX.β1,536Updated 3 years ago
- A catalog of naturally occurring images whose Apple NeuralHash is identical.β150Updated 2 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]β1,067Updated 3 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.β630Updated last year
- The find/replace box in Notepad++ is Turing Completeβ500Updated last year
- Compute NeuralHash for the given imageβ133Updated 3 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to cleaβ¦β1,346Updated this week
- C Compiler which targets Excel (MS Office)β286Updated 4 years ago
- Git repository with a commit for every single shorthashβ205Updated 3 years ago
- Redirect `.idk` domains using Wikipediaβ1,525Updated 10 months ago
- Installing a RGB mechanical keypad on my microwave.β491Updated 3 years ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.β823Updated 3 years ago
- Customize your git commit hashes!β1,836Updated 2 weeks ago
- git is a blockchain. Start your commit hashes with 00000000 like a real blockchain should.β255Updated 4 months ago
- β248Updated 2 years ago
- Binary encoding optimised for Twitterβ847Updated 3 weeks ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography courseβ536Updated 2 years ago
- Hiding messages in x86 programs using semantic dualsβ296Updated 3 weeks ago
- TCP/IP for Casio fx-9860 graphical calculators (with SLIP support, uIP stack)β225Updated 2 years ago
- Perl code that is syntactically correct only on Fridaysβ221Updated 3 years ago
- !!Con West 2019 talkβ350Updated 4 years ago
- Etherify - bringing the ether back to ethernetβ343Updated 3 years ago
- β471Updated 3 years ago
- Utility to find AES keys in running processesβ334Updated last year
- Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsingβ646Updated 4 months ago
- Turn your favourite regex into FAT32β1,008Updated 2 years ago
- Takes a folder of images (as a palette), and an image, and figures out how to tile the palette to resemble the image!β264Updated 2 years ago
- Extracted media files from North Korean OS, Red Star 3.0β213Updated 3 years ago
- State of AIβ645Updated 3 years ago
- OOXML password removerβ586Updated 2 years ago