matteounitn / iHashDNALinks
Perceptual hashing library in python (with redis)
☆13Updated 4 years ago
Alternatives and similar repositories for iHashDNA
Users that are interested in iHashDNA are comparing it to the libraries listed below
Sorting:
- FPE - Format Preserving Encryption with FF3 in C☆13Updated 4 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆13Updated last year
- A tiny library to properly encrypt IP addresses.☆18Updated last week
- ☆18Updated last year
- Worldline Yomani XR Flash Unpacker☆40Updated 7 months ago
- ☆12Updated 4 years ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Updated this week
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆29Updated 10 months ago
- PAM module. If bad guys will force you to unlock, you can use this module to run some command before unlock using "secret" credits.☆11Updated last year
- Committing ChaCha20-BLAKE3, XChaCha20-BLAKE3, and XChaCha20-BLAKE3-SIV AEAD implementations.☆11Updated 3 years ago
- Companion repository to the paper entitled "Fingerprinting in Style: Detecting Browser Extensions via Injected Style Sheets"☆25Updated 3 years ago
- ☆23Updated last month
- Notes and captures for patching TLS in Wireshark (mirror of https://git.lekensteyn.nl/peter/wireshark-notes/)☆17Updated last year
- This repository contains the code for our paper "Browser-based CPU Fingerprinting".☆40Updated 2 years ago
- Cryptonita - cryptanalysis swiss army knife☆14Updated 5 months ago
- Mirror of a website on Elligator by Daniel J. Bernstein, Mike Hamburg, Anna Krasnova, and Tanja Lange☆17Updated 2 months ago
- Randomizes clock when systems boots by adding a few seconds and nanoseconds to enforce the design goal, that the host clock and Gateway/…☆13Updated 5 months ago
- The wolfSSL Command Line Utility wolfCLU☆19Updated last month
- Application-level P2P non-VPN for securely accessing personal servers without a VPN☆37Updated 3 years ago
- Python wrapper for wolfSSL embedded SSL/TLS library.☆39Updated 7 months ago
- A small tool for brute forcing the access code of a Yubico Yubikey.☆20Updated 4 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 7 years ago
- TLS and HTTP signature and fingerprint library☆41Updated 3 years ago
- a high-level async cryptographic anonymity library to scale, simplify, & automate privacy best practices for secure data & identity proce…☆13Updated 3 months ago
- My experiments in understanding AES, Whitebox AES, and related attacks☆17Updated 4 years ago
- Encryption Algorithm Combined☆27Updated 9 years ago
- Bindings for the NaCL implementation of Salsa20 and XSalsa20 by D. J. Bernstein☆32Updated 5 years ago
- Software program that emulates a PPP, SLIP, or CSLIP connection to the Internet via a shell account☆22Updated 5 years ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆14Updated 2 years ago
- Zero-trust SSH CA☆29Updated 9 months ago