anishathalye / neural-hash-colliderLinks
Preimage attack against NeuralHash π£
β673Updated last month
Alternatives and similar repositories for neural-hash-collider
Users that are interested in neural-hash-collider are comparing it to the libraries listed below
Sorting:
- Convert Apple NeuralHash model for CSAM Detection to ONNX.β1,537Updated 4 years ago
- A catalog of naturally occurring images whose Apple NeuralHash is identical.β148Updated 2 years ago
- Git repository with a commit for every single shorthashβ206Updated 4 years ago
- Redirect `.idk` domains using Wikipediaβ1,530Updated 2 weeks ago
- C Compiler which targets Excel (MS Office)β288Updated 5 years ago
- Utility to find AES keys in running processesβ334Updated 2 years ago
- The find/replace box in Notepad++ is Turing Completeβ500Updated 2 years ago
- Installing a RGB mechanical keypad on my microwave.β495Updated 4 years ago
- An open letter against Apple's new privacy-invasive client-side content scanning.β631Updated 2 years ago
- Picture to colour QR code converter hosted on https://QRpicture.comβ574Updated last year
- Imagine your SSH server only listens on an IPv6 address, and where the last 6 digits are changing every 30 seconds as a TOTP code...β420Updated 4 years ago
- Etherify - bringing the ether back to ethernetβ346Updated 4 years ago
- Synthesize photos from PhotoDNA using machine learning π±β146Updated last month
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to cleaβ¦β1,365Updated 2 weeks ago
- Testing Schnorr's factorization claim in Sageβ305Updated 3 years ago
- TCP/IP for Casio fx-9860 graphical calculators (with SLIP support, uIP stack)β230Updated 3 years ago
- TESLA PowerWall 2 Security Shenanigansβ463Updated last year
- Markdown version of Reverse Engineering the source code of the BioNTech/Pfizer SARS-CoV-2 Vaccineβ175Updated 3 years ago
- β1,503Updated 3 years ago
- Perl code that is syntactically correct only on Fridaysβ223Updated 3 years ago
- Intuitive Advanced Cryptographyβ436Updated 3 years ago
- Takes a folder of images (as a palette), and an image, and figures out how to tile the palette to resemble the image!β263Updated 3 years ago
- Avast JavaScript Interactive Shellβ675Updated 5 years ago
- The SHA-256 Project, developed for NYU Tandon's Applied Cryptography courseβ549Updated 3 months ago
- Create fake phone contacts, to do data-poisoning.β570Updated 4 years ago
- git is a blockchain. Start your commit hashes with 00000000 like a real blockchain should.β260Updated last year
- This Word Does Not Existβ1,017Updated 3 years ago
- Renew and Refill Bob Cassettes for 98% Cost Saving!β1,466Updated 5 months ago
- I patched my Slack client to keep messages that others deleteβ350Updated 3 years ago
- no-op statements syntactically valid only since Python X.Yβ353Updated 2 weeks ago