anishathalye / neural-hash-colliderView external linksLinks
Preimage attack against NeuralHash π£
β673Sep 15, 2025Updated 5 months ago
Alternatives and similar repositories for neural-hash-collider
Users that are interested in neural-hash-collider are comparing it to the libraries listed below
Sorting:
- Convert Apple NeuralHash model for CSAM Detection to ONNX.β1,537Aug 21, 2021Updated 4 years ago
- A catalog of naturally occurring images whose Apple NeuralHash is identical.β150Dec 26, 2022Updated 3 years ago
- Compute NeuralHash for the given imageβ133Aug 17, 2021Updated 4 years ago
- Demonstrates iterative FGSM on Apple's NeuralHash model.β16Aug 19, 2021Updated 4 years ago
- Play BangBang against a Neural Networkβ100Jan 24, 2022Updated 4 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to cleaβ¦β1,394Oct 15, 2025Updated 4 months ago
- C++ raytracer that supports custom models. Supports running the calculations on the CPU using C++11 threads or in the GPU via CUDA.β74Dec 24, 2022Updated 3 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.β627Aug 9, 2023Updated 2 years ago
- β358Nov 10, 2021Updated 4 years ago
- A Wordle decoder that guesses your guesses.β40Apr 2, 2022Updated 3 years ago
- β1,506Jul 22, 2022Updated 3 years ago
- β214Mar 31, 2021Updated 4 years ago
- An FHE compiler for C++β3,632Updated this week
- How to build your own AI art installation from scratchβ567Aug 18, 2021Updated 4 years ago
- Mission: Decentralize the Internetβ11Aug 24, 2023Updated 2 years ago
- β42Mar 27, 2022Updated 3 years ago
- β120Jul 9, 2022Updated 3 years ago
- ELF visualizer. Generates HTML files from ELF binaries.β984Apr 21, 2025Updated 9 months ago
- Hash collisions and exploitationsβ3,325Feb 20, 2025Updated 11 months ago
- Cryptanalysis of the Legendre PRF Challengesβ11Nov 27, 2019Updated 6 years ago
- Pickle decompiler plugin for Radare2β18Aug 6, 2023Updated 2 years ago
- Parses https://eprint.iacr.org/eprint-bin/search.pl?last=365&title=1 and sends you an email with the latest papersβ15Nov 11, 2020Updated 5 years ago
- β15May 3, 2019Updated 6 years ago
- Reference of Vehicle Securityγβ13Aug 13, 2021Updated 4 years ago
- The secure messaging summit informationβ20Oct 27, 2020Updated 5 years ago
- Notes on cryptographic schemes and attacksβ25Dec 13, 2018Updated 7 years ago
- Pokemon emerald randomizerβ22Nov 24, 2022Updated 3 years ago
- Notary: A Device for Secure Transaction Approval πβ28Feb 1, 2025Updated last year
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shellβ1,699Dec 22, 2021Updated 4 years ago
- Bundle web files into a single imageβ1,272Jul 31, 2023Updated 2 years ago
- This project will compile verilog (a hardware description language) into factorio blueprints.β804Feb 3, 2025Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456β21Dec 2, 2021Updated 4 years ago
- β15May 27, 2021Updated 4 years ago
- An O(N\log{N}) time algorithm for computing all N proofs fast in the Pointproofs VC. Also, the O(N\log{N}) time Feist-Khovratovich algoriβ¦β13Dec 3, 2020Updated 5 years ago
- Stuff which works in Chrome and maybe Acrobat and Foxit.β1,658Oct 30, 2020Updated 5 years ago
- Simple command line tool for text to image generation using OpenAI's CLIP and Siren (Implicit neural representation network). Technique wβ¦β4,329Mar 13, 2022Updated 3 years ago
- Linux system calls.β217Nov 18, 2019Updated 6 years ago
- Traccar SMS Gateway for Androidβ676Aug 8, 2025Updated 6 months ago
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sockβ7,109Mar 12, 2024Updated last year