Perceptual hashing library in python (with redis)
☆14Mar 26, 2021Updated 4 years ago
Alternatives and similar repositories for iHashDNA
Users that are interested in iHashDNA are comparing it to the libraries listed below
Sorting:
- Simple PoC script that allows you to exploit telegram's "send with timer" feature by saving any media sent with this functionality.☆94Jan 24, 2025Updated last year
- Wikitude SDK to React Native☆12Mar 30, 2022Updated 3 years ago
- Feed the hundreds of millions of domains in the Common Crawl to zgrab☆10Aug 3, 2019Updated 6 years ago
- RPG, Open World, Personality Test with nice graphics☆20Feb 4, 2022Updated 4 years ago
- AEGIS-256☆11Apr 17, 2022Updated 3 years ago
- A (cheating) bot to play blackjack against.☆25Jul 21, 2020Updated 5 years ago
- DeepHash框架,包括DQN、DHN、DVSQ、DCH、DTQ等方法。☆12Jan 18, 2021Updated 5 years ago
- NoBlindi is a command-line tool for exploiting blind NoSQL injection vulnerabilities to recover passwords in web applications.☆28Nov 12, 2023Updated 2 years ago
- Django IMDb Catalogue - Partial Search☆16Feb 22, 2024Updated 2 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Detection for RFC7627 Support (TLS Extended Master Secret Extension)☆14Jan 16, 2020Updated 6 years ago
- image perceptual hash based on ML☆27Jul 17, 2022Updated 3 years ago
- An open-source modular framework capable of identifying a wide range of TLS vulnerabilities and assessing compliance with multiple guidel…☆49Mar 4, 2026Updated 2 weeks ago
- 闲鱼爬虫闲鱼商品数据爬虫,可以爬取闲鱼商品的商 品内容,图片,价格,出售人信息等等☆21Apr 18, 2021Updated 4 years ago
- An OSINT tool for IT ninjas.☆11Jul 31, 2024Updated last year
- Implementation of Weakly Supervised Deep Image Hashing through Tag Embeddings☆25Jun 22, 2022Updated 3 years ago
- SHA256 sentence: discover a SHA256 checksum that matches a sentence's description of hex digit words.☆19Apr 14, 2025Updated 11 months ago
- A collection of Script for Red Team & Incidence Response☆11Jun 30, 2022Updated 3 years ago
- hq2x scaling algorithm updated to support RGBA☆17Jan 14, 2016Updated 10 years ago
- Better lighting for Ubuntu☆10Feb 1, 2016Updated 10 years ago
- Step-by-step guide to Triton deployment on ECS using CDK☆11May 22, 2021Updated 4 years ago
- 迅雷、快车、旋风下载链接转换脚本。☆10Apr 22, 2020Updated 5 years ago
- replacement of AdamW and Lion optimizer for LLMs☆13May 28, 2023Updated 2 years ago
- A simple script to check whenever a user log in or log out from your system.☆10Oct 2, 2020Updated 5 years ago
- AES-GEM (AES Galois Extended Mode) implementation.☆13Feb 9, 2026Updated last month
- Code of the paper "Synthesizing Aspect-Driven Recommendation Explanations from Reviews", IJCAI'20☆10Apr 5, 2024Updated last year
- Visual Hash for matching copies of visually similar images.☆16Mar 17, 2025Updated last year
- Near-duplicate image detection using Locality Sensitive Hashing☆76Aug 10, 2021Updated 4 years ago
- A fast AES-PRF based secure random-number generator☆21Jul 15, 2023Updated 2 years ago
- Convenience utilities for common machine learning tasks on Metaflow☆12Jun 12, 2021Updated 4 years ago
- An implementation of the ROCCA-S encryption scheme.☆20Mar 13, 2026Updated last week
- YunzaiBot-Pixiv插件☆15Feb 4, 2026Updated last month
- My best Java class to compress any String, short or long, with any character of human history☆12Feb 16, 2026Updated last month
- Site for tldr.fail☆35Dec 29, 2025Updated 2 months ago
- Search IQDB from CLI☆10May 6, 2021Updated 4 years ago
- An idiomatic C++ wrapper for the Monocypher crypto library☆12Oct 6, 2024Updated last year
- C implementation of the BlaBla20 cipher☆10Jan 1, 2026Updated 2 months ago
- An Internet-Draft for the Balloon Key Derivation Function (BKDF), a memory-hard password hashing and password-based key derivation functi…☆11Jun 29, 2025Updated 8 months ago
- A pure rust implementation of the gimli cipher☆13Jan 26, 2022Updated 4 years ago