matteounitn / iHashDNA
Perceptual hashing library in python (with redis)
☆13Updated 4 years ago
Alternatives and similar repositories for iHashDNA:
Users that are interested in iHashDNA are comparing it to the libraries listed below
- FPE - Format Preserving Encryption with FF3 in C☆13Updated 2 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- p0f v3 with impersonation spoofing, written in Python - Accurately guess the OS of a packet with passive fingerprinting.☆59Updated 11 months ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- Encryption Algorithm Combined☆25Updated 9 years ago
- Unofficial mirror of TestU01, a test suite for random number generator (C library) for the empirical statistical testing of uniform rando…☆18Updated 6 years ago
- Encrypt files & Hide encrypted data☆13Updated this week
- Python implementation of Tink☆61Updated last week
- Prevent form spam using in-browser proof-of-work (PoW)☆15Updated 10 years ago
- BabelInkCrypt is an open-source project that combines encryption, library of babel, and video making to create a secure infinite storage …☆23Updated last year
- My experiments in understanding AES, Whitebox AES, and related attacks☆15Updated 4 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 3 years ago
- A tiny library to properly encrypt IP addresses.☆13Updated last week
- Make multiple http requests using the Tor network.☆13Updated 2 years ago
- Wipe RAM on shutdown and reboot - Cold Boot Attack Defense☆11Updated last week
- Python CLI and module for CIRCL hash lookup☆12Updated 2 months ago
- Web browser for embedded systems.☆16Updated 2 years ago
- Polyglot detector☆21Updated last year
- CLI tool and Ghidra plug-in for analyzing binaries using under-constrained symbolic execution☆106Updated this week
- Track torrent downloads☆13Updated 2 years ago
- O(1) Cryptography is an easy to use, hard to misuse Java cryptographic library based on O(1) cryptographic algorithms☆16Updated 2 years ago
- The wolfSSL Command Line Utility wolfCLU☆17Updated 3 weeks ago
- Tool for generation of data from cryptoprimitives (block and stream ciphers, hash functions). Cryptoprimitives are round-reduced and the …☆14Updated 2 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆19Updated last year
- ☆112Updated last year
- Analysis of an X.509 certificate☆28Updated 9 years ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆16Updated last month
- A lightweight HTTPS-based proxy for bypassing firewalls.☆18Updated 3 months ago
- A python library to extract TCP sessions from PCAPs.☆22Updated 4 years ago
- jpg Acropalypse POC☆9Updated 2 years ago