anishathalye / neural-hash-collider
Preimage attack against NeuralHash π£
β672Updated last year
Alternatives and similar repositories for neural-hash-collider:
Users that are interested in neural-hash-collider are comparing it to the libraries listed below
- Convert Apple NeuralHash model for CSAM Detection to ONNX.β1,536Updated 3 years ago
- A catalog of naturally occurring images whose Apple NeuralHash is identical.β149Updated 2 years ago
- building the next-gen watermark with deep learning.β184Updated 3 years ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.β820Updated 3 years ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography courseβ536Updated 2 years ago
- Git repository with a commit for every single shorthashβ205Updated 3 years ago
- C Compiler which targets Excel (MS Office)β286Updated 4 years ago
- Imagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...β418Updated 3 years ago
- Avast JavaScript Interactive Shellβ667Updated 4 years ago
- TCP/IP for Casio fx-9860 graphical calculators (with SLIP support, uIP stack)β225Updated 2 years ago
- A "living" Linux process with no memoryβ343Updated 4 years ago
- Installing a RGB mechanical keypad on my microwave.β491Updated 3 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to cleaβ¦β1,345Updated 4 months ago
- Takes a folder of images (as a palette), and an image, and figures out how to tile the palette to resemble the image!β264Updated 2 years ago
- β1,115Updated 4 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]β1,067Updated 2 years ago
- The find/replace box in Notepad++ is Turing Completeβ501Updated last year
- Redirect `.idk` domains using Wikipediaβ1,526Updated 9 months ago
- β216Updated 3 years ago
- duralava is a neural network which can simulate a lava lamp in an infinite loop.β90Updated last year
- Utility to find AES keys in running processesβ334Updated last year
- Synthesize photos from PhotoDNA using machine learning π±β144Updated 2 weeks ago
- Objective reasons to prefer Linux to Windows.β527Updated 3 years ago
- Etherify - bringing the ether back to ethernetβ343Updated 3 years ago
- Twitter client for UEFIβ532Updated 3 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agentβ536Updated 3 years ago
- Picture to colour QR code converter hosted on https://QRpicture.comβ571Updated last year
- no-op statements syntactically valid only since Python X.Yβ350Updated 3 weeks ago
- Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsingβ646Updated 3 months ago
- Implementation of the Foldersπ esoteric programming language, a language with no code and just folders.β445Updated 3 years ago