152 results for “topic:hashing-algorithms”
:books: :chart_with_upwards_trend: Plug-and-play class-library project of standard Data Structures and Algorithms in C#
Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor, and a glimpse into abyss. (header-only C/C++) (Codename Gradilac/Градилак)
Go package porting the standard hashing algorithms to a more efficient implementation.
A collection of classical algorithms and data-structures implementation in C++ for coding interview and competitive programming
Advanced Hash Manipulation
Cryptographic hash functions for Kotlin Multiplatform
A cryptographic library
A .NET implementation of several non-cryptographic hashes.
SHA-256 algorithm implementation (С/С++)
A hash utility, est. 2002, FLOSS. 489 hash functions, HMAC support, cross platform, feature-rich, multi threaded. CLI and API. Recursive hashing, predefined and customizable formats, verify data integrity and find ok/failed/missing/new files, find files by their hashes, find the hash function to a hash. GUI provided by HashGarten.
Ultra fast, high-quality hash functions for hash-tables and hash-maps (non-cryptographic, header-only C/C++) + PRNG
Message Authentication Code algorithms for Kotlin Multiplatform
CSC604: Cryptography and System Security [CSS] & CSL604: System Security Lab [SSL] | TE Semester VI | Computer Engineering
Quantum-Resistant Cryptographic Hash Library for Password Hashing and Verification 🦀
fast and comprehensive k-mer counting package
A cross-platform Swing GUI for Jacksum.
Laravel wrapper for common hashing algorithms used in web applications
Password hash generator
🌱Contribute in Hacktoberfest 2022 by contributing Data Structures and Algorithms Code in any programming language. Create your own issues. ✨Star it 🍴Fork it and Contribute to it <3
A file-based malware removal tool that contains a list of MD5 hashes from known malware, compares them with a selected file, and determines if it's malware. The user then has the option to delete the file from the computer.
Unsupervised Hashing algorithms in python
The Cipher Toolkit Built For All Skill Levels
Clean and well‑structured implementations of the most important Data Structures and Algorithms (DSA) in Java.
Data Structures and Algorithms - Sharif University of Technology
Cyclic Redundance Check hashing algorithm implemented in python
This is my second project about File Organization. It's all about Perfect Hashing Cichelli’s Algorithm.
An optimized JavaScript implementation of the MurmurHash3 algorithm.
Multiple hashing algorithms for Github Actions
A collection of basic python scripts that I wrote