2
#
hashing-algorithms
Here are 79 public repositories matching this topic...
Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
reverse-shell
pentesting
ctf
hashing-algorithms
ctf-tools
encryption-decryption
encoder-decoder
cracking-hashes
hacking-tools
pentest-tools
penetration-testing-tools
swiss-army-knife
-
Updated
Jun 28, 2022 - PHP
Advanced Hash Manipulation
hashing
bruteforce
hash
manipulation
hash-types
dictionary-attack
hashing-algorithms
bruteforce-attacks
password-cracking
hash-manipulation
dagon
-
Updated
Oct 14, 2019 - Python
A collection of classical algorithms and data-structures implementation in C++ for coding interview and competitive programming
c-plus-plus
algorithm
algorithms
graph-algorithms
mathematics
competitive-programming
data-structures
sorting-algorithms
computational-geometry
game-theory
tree-structure
combinatorics
dynamic-programming
coding-interviews
hashing-algorithms
greedy-algorithms
binary-search
number-theory
string-algorithms
backtracking-algorithm
-
Updated
Oct 10, 2020 - C++
A cryptographic library
secret-sharing
elliptic-curve-diffie-hellman
hashing-algorithms
encryption-algorithms
public-key-cryptography
message-authentication-code
cryptographic-library
-
Updated
Jul 16, 2022 - C
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor. (Codename Gradilac/Градилак)
c
hashing
random
hash-functions
hash
prng
random-number-generators
hashing-algorithm
hashing-algorithms
pseudorandom
pseudo-random
prng-methods
pseudo-random-generator
random-numbers
hash-lengths
prng-algorithms
hash-function
-
Updated
Jul 18, 2022 - C
A .NET implementation of several non-cryptographic hashes.
hash-functions
hashing-library
hashing-algorithms
testing-framework
non-cryptographic-hash-functions
fast-algorithms
-
Updated
Jun 28, 2022 - C#
SHA-256 algorithm implementation (С/С++)
c
hashing
cross-platform
cpp
hash-functions
hash
sha2
sha256
hashing-algorithm
hashing-algorithms
sha256sum
sha256-hash
hashing-strings
-
Updated
Aug 8, 2020 - C
Open
AJAX form
4
TheAdnan
commented
Oct 11, 2017
Make this form use a jQuery AJAX call. Make the PR request to the hacktober
branch.
one pro cli/lib to hash them all, 472 hash functions, FOSS, cross platform, feature-rich, multi threaded, verify data integrity, find files by their hashes, find ok/failed/missing/new files, find the hash function to a hash, recursive tree traversal, can hash ADS, predefined and customizable output, multiple well known I/O formats, CLI, API, and accessible at your file browser, support for many charsets, full Unicode and BOM support. Manage checksums, CRCs, hashes, message digests, data fingerprints, and thumbprints.
java
windows
macos
linux
multi-threading
fingerprint
hash-functions
hash
crc
message-digest
checksums
hashing-algorithms
sha3
thumbprint
skein
jacksum
integrity-checker
integrity-tool
hash-finder
crc-finder
-
Updated
Jul 1, 2022 - Java
computer-science
algorithms
graph-algorithms
bit-manipulation
data-structures
sorting-algorithms
computational-geometry
dynamic-programming
hashing-algorithms
search-algorithms
numerical-optimization
greedy-algorithms
numerical-analysis
string-algorithms
divide-and-conquer
algorithms-and-data-structures
algorithmic-toolbox
data-structures-and-algorithms
mathematical-algorithms
bit-hacks
-
Updated
Jun 12, 2022 - C++
fast and comprehensive k-mer counting package
hashing
bioinformatics
rcpp
genomics
feature-extraction
protein-sequences
ngram
ngrams
kmer
k-mer
feature-engineering
hashing-algorithms
k-mer-counting
kmer-frequency-count
kmer-counting
rpackage
bioinformatics-tool
kmers
rcppparallel
dna-processing
-
Updated
Sep 27, 2021 - C++
Laravel wrapper for common hashing algorithms used in web applications
hashing
laravel
cryptography
algorithm
base64
base64url
random-generation
blake2b
sha256
programmers
hashing-algorithms
blake2b-hash-algorithm
-
Updated
Apr 18, 2021 - PHP
An optimized JavaScript implementation of the MurmurHash3 algorithm.
javascript
hashing
murmurhash3
hash-functions
hash
hashing-library
hashing-algorithm
murmurhash
floating-point
hashing-algorithms
hashing-speedup
floating-point-arithmetic
murmurhash-js
-
Updated
Aug 1, 2020 - JavaScript
Find similar images in several directories by aHash/dHash/pHash.
-
Updated
Nov 18, 2021 - C#
This is my second project about File Organization. It's all about Perfect Hashing Cichelli’s Algorithm.
-
Updated
Aug 17, 2019 - C#
A GPU cracking hashed passwords library written in C++.
gpu
password-generator
opencl
bruteforce
cpp11
md5
sha1
cracking
dictionary-attack
hashing-algorithms
-
Updated
Mar 22, 2017 - C++
MinMax Circular Sector Arc for External Plagiarism’s Heuristic Retrieval Stage code
nlp
information-retrieval
high-dimensional-data
python3
lsh
locality-sensitive-hashing
hashing-algorithms
approximate-nearest-neighbor-search
jaccard-similarity
minmax-algorithm
plagiarism-detection
external-plagiarism
heuristic-retrieval
hashing-speedup
scalable-similarity-search
-
Updated
Nov 2, 2017 - Python
Cryptographic hashing algorithms as a Java library with standard JCA adapters
java
hashing
library
cryptography
crypto
hash
md5
sha2
digest
cryptography-library
sha1
sha256
crypto-library
hashing-algorithms
ripemd160
tiger
messagedigest
cryptohash
-
Updated
Feb 12, 2022 - Java
Handy calculators for your browser.
-
Updated
Jul 7, 2022 - TypeScript
This library contains 4 cryptographic algorithms.
-
Updated
May 21, 2019 - C
A file-based malware removal tool that contains a list of MD5 hashes from known malware, compares them with a selected file, and determines if it's malware. The user then has the option to delete the file from the computer.
-
Updated
Oct 7, 2020 - C#
Unsupervised Hashing algorithms in python
-
Updated
Apr 3, 2022 - Python
A thorough introduction into the world of ciphers, their history, security and code implementation.
java
cryptography
encryption
cipher
probability
mathematics
ciphers
hashing-algorithms
modern-ciphers
-
Updated
Aug 6, 2021 - Java
An experimental hashing algorithm for optical/quantum computers based on Toffoli and Fredkin gates.
-
Updated
Sep 9, 2020 - Python
Find out which hashing algorithm was used to generate hex hash string from your input
-
Updated
May 11, 2018 - JavaScript
Improve this page
Add a description, image, and links to the hashing-algorithms topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the hashing-algorithms topic, visit your repo's landing page and select "manage topics."
steps to reproduce
Write a loop, from 1 to 80000, each time add a random int to the max heap.
In theory it takes very little time(NlogN, N=80000, <1sec ), but the program does take a long time.
I'v also tested the BinaryHeap in https://github.com/SolutionsDesign/Algorithmia, it performs well, so it is probably due to the bad algorithm.