A python tool to identify different Hash Function Algorithms
Support
Quality
Security
License
Reuse
Software to identify the different types of hashes used to encrypt data and especially passwords
Support
Quality
Security
License
Reuse
Murmur3 hash in C
Support
Quality
Security
License
Reuse
Solutions to problems on Interview Bit
Support
Quality
Security
License
Reuse
分布式WEB指纹识别平台 Distributed WEB fingerprint identification platform
Support
Quality
Security
License
Reuse
Automated integer hash function discovery
Support
Quality
Security
License
Reuse
Easy to use, modular, header only, macro based, generic and type-safe Data Structures in C
Support
Quality
Security
License
Reuse
A super-fast C++ hash table with Node.js wrapper, tested up to 1 billion keys.
Support
Quality
Security
License
Reuse
:1234: A heap-based implementation of priority queue
Support
Quality
Security
License
Reuse
Portable C++ hashing library
Support
Quality
Security
License
Reuse
A pure Go implementation of the Pastry Distributed Hash Table
Support
Quality
Security
License
Reuse
Flexihash is a small PHP library which implements consistent hashing.
Support
Quality
Security
License
Reuse
A Java standalone implementation of the bcrypt password hash function. Based on the Blowfish cipher it is the default password hash algorithm for OpenBSD and other systems including some Linux distributions. Includes a CLI Tool.
Support
Quality
Security
License
Reuse
Make your ActiveRecord ids non-obvious. Mixes up record ids in a simple, reversible hashing algorithm so that it can then automatically revert the hashed number back to the original id for record lookup without having to store a hash or tag in the database.
Support
Quality
Security
License
Reuse
A Rust implementation of the XXHash algorithm.
Support
Quality
Security
License
Reuse
Intrusive collections for Rust
Support
Quality
Security
License
Reuse
Functions for for hash map (assoc array) traversal.
Support
Quality
Security
License
Reuse
A simple SHA-3 / Keccak hash function for JavaScript supports UTF-8 encoding.
Support
Quality
Security
License
Reuse
ID hashing and Obfuscation using Knuth's Algorithm
Support
Quality
Security
License
Reuse
Support
Quality
Security
License
Reuse
A universal Consistent Hash implementation in Java, which supports virtual nodes and user defined hash function
Support
Quality
Security
License
Reuse
hashring is a consistent hashing algorithm for Node.js that is compatible with libketama and python's hash_ring package
Support
Quality
Security
License
Reuse
A simple SHA1 hash function for JavaScript supports UTF-8 encoding.
Support
Quality
Security
License
Reuse
This repository has been desired to show different Android Security Approach implementations using a simple sample project.
Support
Quality
Security
License
Reuse
Substitute for bloom filter.
Support
Quality
Security
License
Reuse
Support
Quality
Security
License
Reuse
Argon2 Binding for the JVM
Support
Quality
Security
License
Reuse
Python Binding for xxHash
Support
Quality
Security
License
Reuse
Use Hashids (http://hashids.org/ruby/) in your Rails app ActiveRecord models.
Support
Quality
Security
License
Reuse
Open source implementation of "Spreading Vectors for Similarity Search"
Support
Quality
Security
License
Reuse
MetroHash v1: Exceptionally fast and statistically robust hash functions
Support
Quality
Security
License
Reuse
One of the fastest hash functions
Support
Quality
Security
License
Reuse
C++ implementation of a memory efficient hash map and hash set
Support
Quality
Security
License
Reuse
Python library to calculate the difference hash (perceptual hash) for a given image, useful for detecting duplicates
Support
Quality
Security
License
Reuse
Cryptographic suite for Arduino (SHA, HMAC-SHA)
Support
Quality
Security
License
Reuse
Fast, reliable cuckoo hash table for Node.js.
Support
Quality
Security
License
Reuse
Super fast hashing library based on murmurhash3 written in Vanilla JS
Support
Quality
Security
License
Reuse
Finding and deleting near-duplicate images based on perceptual hash.
Support
Quality
Security
License
Reuse
使用scrapy,redis, mongodb,django实现的一个分布式网络爬虫,底层存储mongodb,分布式使用redis实现,使用django可视化爬虫
Support
Quality
Security
License
Reuse
Random collection of blocks
Support
Quality
Security
License
Reuse
Easily hash and verify passwords using Bcrypt
Support
Quality
Security
License
Reuse
Dump ntds.dit really fast
Support
Quality
Security
License
Reuse
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor. (Codename Gradilac/Градилак)
Support
Quality
Security
License
Reuse
.Net ULID implementation
Support
Quality
Security
License
Reuse
Hash functions in pure javascript
Support
Quality
Security
License
Reuse
Fowler–Noll–Vo hash function
Support
Quality
Security
License
Reuse
Huge Collections for Java using efficient off heap storage
Support
Quality
Security
License
Reuse
Implements a fixed-capacity stack-allocated Vec alternative backed by an array, using const generics.
Support
Quality
Security
License
Reuse
Python extension for MurmurHash (MurmurHash3), a set of fast and robust hash functions.
Support
Quality
Security
License
Reuse
Javascript implementation of xxHash
Support
Quality
Security
License
Reuse
H
Hash-Algorithm-Identifierby AnimeshShaw
A python tool to identify different Hash Function Algorithms
Python 374Updated: 4 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
h
hash-identifierby blackploit
Software to identify the different types of hashes used to encrypt data and especially passwords
Python 373Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
m
Support
Quality
Security
License
Reuse
I
Interview-Bitby royalpranjal
Solutions to problems on Interview Bit
C++ 370Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
w
w11scanby w-digital-scanner
分布式WEB指纹识别平台 Distributed WEB fingerprint identification platform
CSS 369Updated: 4 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
h
hash-prospectorby skeeto
Automated integer hash function discovery
C 367Updated: 2 y ago License: Permissive (Unlicense)
Support
Quality
Security
License
Reuse
C
C-Macro-Collectionsby LeoVen
Easy to use, modular, header only, macro based, generic and type-safe Data Structures in C
C 364Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
m
megahashby jhuckaby
A super-fast C++ hash table with Node.js wrapper, tested up to 1 billion keys.
JavaScript 363Updated: 4 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
p
priority-queueby datastructures-js
:1234: A heap-based implementation of priority queue
JavaScript 356Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
h
hash-libraryby stbrumme
Portable C++ hashing library
C++ 356Updated: 2 y ago License: Permissive (Zlib)
Support
Quality
Security
License
Reuse
w
wendyby secondbit
A pure Go implementation of the Pastry Distributed Hash Table
Go 356Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
f
flexihashby pda
Flexihash is a small PHP library which implements consistent hashing.
PHP 353Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
b
bcryptby patrickfav
A Java standalone implementation of the bcrypt password hash function. Based on the Blowfish cipher it is the default password hash algorithm for OpenBSD and other systems including some Linux distributions. Includes a CLI Tool.
Java 352Updated: 1 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
o
obfuscate_idby namick
Make your ActiveRecord ids non-obvious. Mixes up record ids in a simple, reversible hashing algorithm so that it can then automatically revert the hashed number back to the original id for record lookup without having to store a hash or tag in the database.
Ruby 345Updated: 4 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
t
twox-hashby shepmaster
A Rust implementation of the XXHash algorithm.
Rust 341Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
i
intrusive-rsby Amanieu
Intrusive collections for Rust
Rust 340Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
g
get-inby igorw
Functions for for hash map (assoc array) traversal.
PHP 333Updated: 4 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
j
js-sha3by emn178
A simple SHA-3 / Keccak hash function for JavaScript supports UTF-8 encoding.
JavaScript 327Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
o
optimus-goby pjebs
ID hashing and Obfuscation using Knuth's Algorithm
Go 326Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
I
IgushArrayby igushev
C++ 326Updated: 4 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
C
ConsistentHashby Jaskey
A universal Consistent Hash implementation in Java, which supports virtual nodes and user defined hash function
Java 325Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
n
node-hashringby 3rd-Eden
hashring is a consistent hashing algorithm for Node.js that is compatible with libketama and python's hash_ring package
JavaScript 321Updated: 3 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
j
js-sha1by emn178
A simple SHA1 hash function for JavaScript supports UTF-8 encoding.
JavaScript 317Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
s
security-workshop-sampleby temyco
This repository has been desired to show different Android Security Approach implementations using a simple sample project.
Kotlin 315Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
C
CuckooFilterby begeekmyfriend
Substitute for bloom filter.
C 311Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
C
ConcurrencyFreaksby pramalhe
Java 310Updated: 3 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
a
argon2-jvmby phxql
Argon2 Binding for the JVM
Java 309Updated: 2 y ago License: Weak Copyleft (LGPL-3.0)
Support
Quality
Security
License
Reuse
p
python-xxhashby ifduyue
Python Binding for xxHash
C 309Updated: 2 y ago License: Permissive (BSD-2-Clause)
Support
Quality
Security
License
Reuse
h
hashid-railsby jcypret
Use Hashids (http://hashids.org/ruby/) in your Rails app ActiveRecord models.
Ruby 308Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
s
spreadingvectorsby facebookresearch
Open source implementation of "Spreading Vectors for Similarity Search"
Python 306Updated: 2 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
M
MetroHashby jandrewrogers
MetroHash v1: Exceptionally fast and statistically robust hash functions
C++ 303Updated: 3 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
t
t1haby erthink
One of the fastest hash functions
C 303Updated: 3 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
s
sparse-mapby Tessil
C++ implementation of a memory efficient hash map and hash set
C++ 302Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
d
dhashby benhoyt
Python library to calculate the difference hash (perceptual hash) for a given image, useful for detecting duplicates
Python 301Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
C
Cryptosuiteby Cathedrow
Cryptographic suite for Arduino (SHA, HMAC-SHA)
Java 295Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
h
hash-tableby ronomon
Fast, reliable cuckoo hash table for Node.js.
JavaScript 293Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
o
ohashby unjs
Super fast hashing library based on murmurhash3 written in Vanilla JS
JavaScript 292Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
i
imgdupesby knjcode
Finding and deleting near-duplicate images based on perceptual hash.
Python 290Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
t
tc_zufangby shisiying
使用scrapy,redis, mongodb,django实现的一个分布式网络爬虫,底层存储mongodb,分布式使用redis实现,使用django可视化爬虫
CSS 290Updated: 2 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
O
OpenBlocksby OpenMods
Random collection of blocks
Java 285Updated: 4 y ago License: Proprietary (Proprietary)
Support
Quality
Security
License
Reuse
r
rust-bcryptby Keats
Easily hash and verify passwords using Bcrypt
Rust 285Updated: 1 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
g
gosecretsdumpby C-Sto
Dump ntds.dit really fast
Go 284Updated: 2 y ago License: Strong Copyleft (GPL-3.0)
Support
Quality
Security
License
Reuse
p
prvhashby avaneev
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor. (Codename Gradilac/Градилак)
C 283Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
N
Support
Quality
Security
License
Reuse
h
hash.jsby indutny
Hash functions in pure javascript
JavaScript 273Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
r
rust-fnvby servo
Fowler–Noll–Vo hash function
Rust 273Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
H
HugeCollections-OLDby peter-lawrey
Huge Collections for Java using efficient off heap storage
Java 272Updated: 4 y ago License: No License (No License)
Support
Quality
Security
License
Reuse
s
staticvecby slightlyoutofphase
Implements a fixed-capacity stack-allocated Vec alternative backed by an array, using const generics.
Rust 268Updated: 2 y ago License: Permissive (Apache-2.0)
Support
Quality
Security
License
Reuse
m
mmh3by hajimes
Python extension for MurmurHash (MurmurHash3), a set of fast and robust hash functions.
C 266Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse
j
js-xxhashby pierrec
Javascript implementation of xxHash
JavaScript 264Updated: 2 y ago License: Permissive (MIT)
Support
Quality
Security
License
Reuse