Preimage attack against NeuralHash π£
β671Sep 15, 2025Updated 6 months ago
Alternatives and similar repositories for neural-hash-collider
Users that are interested in neural-hash-collider are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Convert Apple NeuralHash model for CSAM Detection to ONNX.β1,536Aug 21, 2021Updated 4 years ago
- A catalog of naturally occurring images whose Apple NeuralHash is identical.β150Dec 26, 2022Updated 3 years ago
- building the next-gen watermark with deep learning.β186Aug 31, 2021Updated 4 years ago
- A Pluggable Authentication Module (PAM) which allows the establishment of alternate passwords that can be used to perform actions to cleaβ¦β1,400Oct 15, 2025Updated 5 months ago
- Play BangBang against a Neural Networkβ100Jan 24, 2022Updated 4 years ago
- NordVPN Special Discount Offer β’ AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- An open letter against Apple's new privacy-invasive client-side content scanning.β625Aug 9, 2023Updated 2 years ago
- β10Nov 23, 2021Updated 4 years ago
- β47Aug 19, 2021Updated 4 years ago
- Synthesize photos from PhotoDNA using machine learning π§¬β151Sep 15, 2025Updated 6 months ago
- β358Nov 10, 2021Updated 4 years ago
- Notary: A Device for Secure Transaction Approval πβ28Feb 1, 2025Updated last year
- An FHE compiler for C++β3,636Feb 19, 2026Updated last month
- C++ raytracer that supports custom models. Supports running the calculations on the CPU using C++11 threads or in the GPU via CUDA.β74Dec 24, 2022Updated 3 years ago
- How to build your own AI art installation from scratchβ568Aug 18, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off β’ AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- β48Nov 1, 2021Updated 4 years ago
- My MEng thesis code - verifying a security property for an SoC with Rosetteβ17Jun 9, 2021Updated 4 years ago
- A Wordle decoder that guesses your guesses.β40Apr 2, 2022Updated 3 years ago
- β1,506Jul 22, 2022Updated 3 years ago
- Bundle web files into a single imageβ1,272Jul 31, 2023Updated 2 years ago
- Hash collisions and exploitationsβ3,350Feb 20, 2025Updated last year
- β120Jul 9, 2022Updated 3 years ago
- Stuff which works in Chrome and maybe Acrobat and Foxit.β1,660Oct 30, 2020Updated 5 years ago
- Compare Bloxroute and Fiber transaction streamsβ10Nov 22, 2024Updated last year
- DigitalOcean Gradient AI Platform β’ AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- β13Aug 10, 2021Updated 4 years ago
- Simple command line tool for text to image generation using OpenAI's CLIP and Siren (Implicit neural representation network). Technique wβ¦β4,326Mar 13, 2022Updated 4 years ago
- Use Log4Shell vulnerability to vaccinate a victim server against Log4Shellβ1,698Dec 22, 2021Updated 4 years ago
- This extension attempts to make Google Images look and feel like it did before they changed everything on August 6th, 2019.β374Sep 21, 2023Updated 2 years ago
- Linux system calls.β217Nov 18, 2019Updated 6 years ago
- ELF visualizer. Generates HTML files from ELF binaries.β990Apr 21, 2025Updated 11 months ago
- Notes on cryptographic schemes and attacksβ25Dec 13, 2018Updated 7 years ago
- A research-based pihole list to reduce tracking by Apple and Googleβ326Jun 16, 2023Updated 2 years ago
- The single instruction C compilerβ10,162May 29, 2024Updated last year
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Ghidra is a software reverse engineering (SRE) frameworkβ66,079Mar 17, 2026Updated last week
- A tool for formally verifying constant-time software against hardware π°οΈβ14Feb 1, 2025Updated last year
- Elliptic curve search experimentsβ35Mar 6, 2023Updated 3 years ago
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.β13Apr 11, 2022Updated 3 years ago
- tic-tac-toe in a single call to printfβ2,433Jun 8, 2022Updated 3 years ago
- Get Your 3D Printed High Security Keyβ147Oct 1, 2021Updated 4 years ago
- Depix is a PoC for a technique to recover plaintext from pixelized screenshots.β4,468Apr 16, 2025Updated 11 months ago