matteounitn / iHashDNA
Perceptual hashing library in python (with redis)
☆13Updated 4 years ago
Alternatives and similar repositories for iHashDNA
Users that are interested in iHashDNA are comparing it to the libraries listed below
Sorting:
- FPE - Format Preserving Encryption with FF3 in C☆13Updated 2 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- Small library to parse TLS records.☆18Updated last month
- ☆12Updated 4 years ago
- CLI Java wrapper for the PhotoDNA library☆25Updated last year
- An open-source modular framework capable of identifying a wide range of TLS vulnerabilities and assessing compliance with multiple guidel…☆45Updated last week
- singe's grep - a fast grep using single-file parallelism☆47Updated 2 years ago
- Zero-trust SSH CA☆29Updated 8 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- A way to use fonts to obfuscate text.☆45Updated 2 years ago
- My experiments in understanding AES, Whitebox AES, and related attacks☆16Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Polyglot detector☆21Updated last year
- Next level Java web security framework☆16Updated 6 months ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆20Updated 3 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆10Updated last month
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Updated 5 years ago
- ☆12Updated 2 years ago
- AXFR all the things!☆26Updated 4 months ago
- Pure python ChaCha20Poly1305 implementation☆25Updated 5 years ago
- Very simple cross-platform utility to manage your git identities.☆10Updated 2 years ago
- ☆23Updated this week
- The Keccak hash algorithm implemented inside of a RAR archive using the RAR filter assembly language☆23Updated 10 years ago
- Tooling for data type and structure management☆11Updated 4 months ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- Fuzzing compression libraries☆19Updated 9 years ago
- Read pcap and har files and assemble HTTP requests☆18Updated last year
- PoC for our attacks on MEGA.☆27Updated 2 years ago
- A list of backdoor samples I find online.☆13Updated 5 years ago
- Static analysis tool that detects potential ransomware in PE and ELF files through heuristic analysis☆18Updated last year