anishathalye / neural-hash-colliderLinks
Preimage attack against NeuralHash π£
β669Updated 2 years ago
Alternatives and similar repositories for neural-hash-collider
Users that are interested in neural-hash-collider are comparing it to the libraries listed below
Sorting:
- Convert Apple NeuralHash model for CSAM Detection to ONNX.β1,534Updated 3 years ago
- A catalog of naturally occurring images whose Apple NeuralHash is identical.β148Updated 2 years ago
- Git repository with a commit for every single shorthashβ205Updated 4 years ago
- β449Updated 2 years ago
- An open source implementation of Apple's Wi-Fi Password Sharing protocol in Python.β827Updated 4 years ago
- Utility to find AES keys in running processesβ336Updated 2 years ago
- Etherify - bringing the ether back to ethernetβ345Updated 3 years ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography courseβ540Updated 3 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.β630Updated last year
- Takes a folder of images (as a palette), and an image, and figures out how to tile the palette to resemble the image!β263Updated 3 years ago
- Imagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...β417Updated 4 years ago
- C Compiler which targets Excel (MS Office)β287Updated 4 years ago
- β610Updated 8 years ago
- Intuitive Advanced Cryptographyβ438Updated 2 years ago
- Installing a RGB mechanical keypad on my microwave.β493Updated 4 years ago
- A "living" Linux process with no memoryβ344Updated 5 years ago
- Off The Grid Messengerβ516Updated 3 years ago
- GIF displaying its own MD5 (hashquine)β77Updated 5 years ago
- The find/replace box in Notepad++ is Turing Completeβ499Updated 2 years ago
- Avast JavaScript Interactive Shellβ672Updated 5 years ago
- tic-tac-toe in a single call to printfβ2,331Updated 3 years ago
- Craft PNG files that appear completely different in Apple software [NOW PATCHED]β1,068Updated 3 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to cleaβ¦β1,352Updated 3 months ago
- This AI Does Not Exist: generate realistic descriptions of made-up machine learning models.β147Updated 3 years ago
- Downloading images from the web is as easy as right clicking them and selecting "Save image as..", right? Well, not anymore xDβ342Updated last year
- Objective reasons to prefer Linux to Windows.β528Updated 3 years ago
- !!Con West 2019 talkβ353Updated 4 years ago
- TCP/IP for Casio fx-9860 graphical calculators (with SLIP support, uIP stack)β226Updated 3 years ago
- Markdown version of Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccineβ174Updated 3 years ago
- Create fake phone contacts, to do data-poisoning.β567Updated 4 years ago