Showing 67 open source projects for "hash function"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Leverage AI to Automate Medical Coding Icon
    Leverage AI to Automate Medical Coding

    Medical Coding Solution

    As a healthcare provider, you should be paid promptly for the services you provide to patients. Slow, inefficient, and error-prone manual coding keeps you from the financial peace you deserve. XpertDox’s autonomous coding solution accelerates the revenue cycle so you can focus on providing great healthcare.
    Learn More
  • 1
    HighwayHash

    HighwayHash

    Fast strong hash functions: SipHash/HighwayHash

    HighwayHash is a fast, keyed hash function intended for scenarios where you need strong, DoS-resistant hashing without the full overhead of a general-purpose cryptographic hash. It’s designed to defeat hash-flooding attacks by mixing input with wide SIMD operations and a branch-free inner loop, so adversaries can’t cheaply craft many colliding keys. The implementation targets multiple CPU families with vectorized code paths while keeping a portable fallback, yielding high throughput across platforms. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hash Calculator Farm

    Hash Calculator Farm

    Hash Calculator

    Hash Farm is a hash calculator that calculate hash of any files and input text.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Serverless Offline

    Serverless Offline

    Emulate AWS λ and API Gateway locally

    ...Once you run a function that boots up the Docker container, it'll look through the layers for that function, download them in order to your layers folder, and save a hash of your layers so it can be re-used in future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Modsurfer

    Modsurfer

    Modsurfer provides ops & dev teams with a system of record

    Modsurfer provides ops & dev teams with the first system-of-record and diagnostics application to search, browse, validate, audit, and investigate WebAssembly binaries. At-a-glance insights into WebAssembly module data (code size & complexity, imports/exports & more). Search for details about modules (hash, ID, function names, strings, namespaces, errors & more). Easily audit and track all the WebAssembly code in your stack. Debug & triage issues otherwise difficult to pinpoint in opaque WebAssembly format. Write or generate a "check file" to track binary requirements. If a module fails validation, a helpful report is created to get things back on track. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Financial reporting cloud-based software. Icon
    Financial reporting cloud-based software.

    For companies looking to automate their consolidation and financial statement function

    The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
    Learn More
  • 5
    f2568

    f2568

    f2568() - A variable Length Tabulation Hash Function

    f2568() is a variable length tabulation hashing function which returns a 64 bit hash result of input data up to a size of 256 bytes. It’s quite fast (basically requiring as many XOR operations as the data length in bytes), easy to understand and very strong at the same time. f2568() is publicly available under the BSD-3-Clause License. Being a tabulation hash function, it’s not 4-independent, which can safely be ignored for the intended purposes. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Go Recipes

    Go Recipes

    Collection of handy tools for Go projects

    Visualize the distribution of code coverage in your project. This helps to identify code areas with high and low coverage. Useful when you have a large project with lots of files and packages. This 2D image-hash of your project should be more representative than a single number. For each module, the node representing the greatest version (i.e., the version chosen by Go's minimal version selection algorithm) is colored green. Other nodes, which aren't in the final build list, are colored grey...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    Tiny CUDA Neural Networks

    Tiny CUDA Neural Networks

    Lightning fast C++/CUDA neural network framework

    This is a small, self-contained framework for training and querying neural networks. Most notably, it contains a lightning-fast "fully fused" multi-layer perceptron (technical paper), a versatile multiresolution hash encoding (technical paper), as well as support for various other input encodings, losses, and optimizers. We provide a sample application where an image function (x,y) -> (R,G,B) is learned. The fully fused MLP component of this framework requires a very large amount of shared memory in its default configuration. It will likely only work on an RTX 3090, an RTX 2080 Ti, or high-end enterprise GPUs. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    DeepCopy

    DeepCopy

    Create deep copies (clones) of your objects

    ...You use __clone() and implement the behavior yourself. DeepCopy recursively traverses all the object's properties and clones them. To avoid cloning the same object twice it keeps a hash map of all instances and thus preserves the object graph. Alternatively, you can create your own DeepCopy instance to configure it differently. You may want to roll your own deep copy function. You can add filters to customize the copy process. DeepCopy\Matcher applies on a object attribute. DeepCopy\TypeMatcher applies on any element found in graph, including array elements. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    DwarFS

    DwarFS

    A fast high compression read-only file system for Linux, Windows

    The Deduplicating Warp-speed Advanced Read-only File System. A fast high compression read-only file system for Linux and Windows. DwarFS is a read-only file system with a focus on achieving very high compression ratios in particular for very redundant data. This probably doesn't sound very exciting, because if it's redundant, it should compress well. However, I found that other read-only, compressed file systems don't do a very good job at making use of this redundancy. See here for a...
    Downloads: 13 This Week
    Last Update:
    See Project
  • Pest Control Management Software Icon
    Pest Control Management Software

    Pocomos is a cloud-based field service solution that caters to businesses

    Built for the pest control industry, but also works great for Mosquito Control, Bin Cleaning, Window Washing, Solar Panel Cleaning, and other Home Service Businesses in need of an easy-to-use software that helps you simplify routing, scheduling, communications, payment processing, truck tracking, time tracking, and reporting.
    Learn More
  • 10
    EDGE Toolkit

    EDGE Toolkit

    Cross-platform Integrated Security Suite written in Go

    Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC/PMAC/GMAC/VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2/Argon2/Scrypt), password-hashing scheme (Bcrypt/Argon2/Makwa), shared key agreement (ECDH/VKO/X25519), digital signature (RSA/ECDSA/EdDSA/GOST/SPHINCS+), X.509 CSRs, CRLs and Certificates, and TCP instant server with TLS 1.3 and TLCP encryption layers for small or embedded systems.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 11
    Node Redis

    Node Redis

    A high performance Node.js Redis client

    This library is a 1 to 1 mapping of the Redis commands. Each Redis command is exposed as a function on the client object. All functions take either an args Array plus optional callback Function or a variable number of individual arguments followed by an optional callback. Node Redis currently doesn't natively support promises (this is coming in v4), however you can wrap the methods you want to use with promises using the built-in Node.js util.promisify method on Node.js >= v8. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 13
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 14

    C++ Complex Calculator

    C++ complex calculator with arrays, matrices, eigenvectors, functions

    ...Householder reduction is used for determinants, eigenvectors, and QR matrix factorization. Class Matrix and class Polynomial facilitate finding the characteristic polynomial. A hash table is used to do fast variable and function lookup (they are entries in the same table). Collisions are handled in the hash table by making each entry a linked list. Written as C++ classes using the STL libraries <complex> and <vector>. The Numerical Recipes routines zroots and laguer rewritten in C++ find the complex roots of a polynomial with complex coefficients. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Quaternion Lorentz

    Complex quaternion calculator with Lorentz boosts and rotations

    C++ code to perform the Lorentz boosts and rotations of special relativity using complex quaternions The interface is a complex quaternion console-based calculator with operations + - * / ^ and functions for Lorentz boosts and rotations. THEORY Complex quaternions have form q = A + B * I + C * J + D * K with A, B, C, D complex I * I = -1 , J * J = -1 , K * K = -1, I * J = K, J * I = -K , J * K = I,K * J = -I, K * I = J, I * K = -J Transpose T takes I into -I, J into -J, K...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design — ARX-based sponge resistant to Grover-type attacks. Context and salt separation — unique hashing domains for each use-case. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Schizoware

    Bulk image name and hash randomizer

    NOTICE: MD5 randomization function currently doesn't work on 4chan for .gif and .webm. Download the 4chan version of Schizoware for .png and .jpg. It's slower, but it's the only way to randomize hashes on 4chan. This is a meme program I originally started making because I kept running into people stalking me through images using 4chan archives (which goes against the whole anonymity aspect and that sucks). The program is capable of renaming (into a choice of 4chan, tumblr, KYM or UUID...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Class-Hashmap

    Class Hashmap Code

    This implementation uses a simple hash function that takes the modulus of the hash value with the size of the hashmap to get the index of the bucket where the key-value pair should be stored. It handles collisions by using a linked list to store multiple key-value pairs in the same bucket. The add method takes a key-value pair and adds it to the hashmap. If the bucket at the index returned by the hash function is empty, it creates a new linked list with the key-value pair. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 20
    OpenSSL for Windows

    OpenSSL for Windows

    OpenSSL Portable for Windows 32-bit and Android

    ...It is also a general-purpose cryptography library. GOST Engine: GOST 28147-89 - 64-bit block cipher with 256-bit key. GOST R 34.11-94 - Message digest algorithm. 256-bit hash value. GOST R 34.10-2001 - Digital signature algorithm. GOST R 34.10-2012 - Digital signature algorithm. GOST R 34.11-2012 - "Streebog" hash function 256 and 512-bit. GOST R 34.12-2015 - "Magma" block cipher (new). GOST R 34.12-2015 - "Kuznyechik" (Grasshopper) 128-bit block cipher. Check also: https://sourceforge.net/projects/edgetk/ Visit: http://albanese.atwebpages.com
    Leader badge
    Downloads: 1,522 This Week
    Last Update:
    See Project
  • 21
    GOST Toolkit ☭

    GOST Toolkit ☭

    Cross-platform GOST Security Suite written in Pure Go

    Multi purpose cross-platform cryptography tool for symmetric encryption, hash digest, cipher-based message authentication code (CMAC) hash-based message authentication code (HMAC), digital signature, shared key agreement (VKO) and PBKDF2 function. GOST is GOvernment STandard of Russian Federation: GOST 28147-89 64-bit block cipher (RFC 5830) GOST R 34.11-94 hash function 256-bit (RFC 5831) GOST R 50739-95 data sanitization method (non-cryptographic) GOST R 34.10-2001 public key signature function (RFC 5832) GOST R 34.10-2012 public key signature function (RFC 7091) GOST R 34.11-2012 Стрибог (Streebog) hash function 256/512-bit (RFC 6986) GOST R 34.12-2015 128-bit block cipher Кузнечик (Kuznechik) (RFC 7801) GOST R 34.12-2015 64-bit block cipher Магма (Magma) Source code: https://github.com/pedroalbanese/gosttk Visit: http://albanese.atwebpages.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    hashmap

    hashmap

    A Golang lock-free thread-safe HashMap optimized for fastest access

    ...The Get() function contains helper functions that have been inlined manually until the Golang compiler will inline them automatically. It optimizes the slice access by circumventing the Golang size check when reading from the slice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    GMSM Toolkit v1.2.3 ☭ Multi purpose cross-platform cryptography tool for asymmetric/symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function. SM2/SM3/SM4 Chinese National Standard Algoritms: • GM/T 0003-2012 - SM2 Public key algorithm 256-bit. • GM/T 0004-2012 - SM3 Message digest algorithm. 256-bit hash value. • GM/T 0002-2012 - SM4 Symmetric block cipher with 128-bit key. Cryptographic Functions: • Asymmetric Encryption/Decryption • Symmetric Encryption/Decryption • Digital Signature (ECDSA) • Shared Key Agreement (ECDH) • Recursive Hash Digest + Check • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) • TLS Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    JavaScript MD5

    JavaScript MD5

    Compatible with server-side environments like node.js

    ...It allows you to generate MD5 hashes from strings, arrays, ArrayBuffers, and other binary-like data types, making it useful for checksums, fingerprinting, and simple integrity checks on the client or server. The library is exposed as a plain function, so usage is as simple as calling md5(value) and receiving the 32-character hexadecimal hash. It supports multiple packaging formats, including UMD, making it easy to drop into legacy codebases as well as modern bundlers like webpack or Browserify. A comprehensive test suite and demo page are provided to validate behavior across platforms and edge cases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    HashApp

    python software for cracking and creating SHA and MD5 hashes

    A python software that can be used for encrypting text in SHA384, SHA512, SHA224, SHA1, SHA256 and MD5; or for cracking six different types of hashes, namely SHA384, SHA512, SHA224, SHA1, SHA256 and MD5 through a dictionary attack using an online txt file. You need to have python 3 or above installed to run this progam. If you would like to change the online dictionary URL for hash decryption, use CTRL+F in your text editor and search for this line: LIST_OF_WORDS = str(urlopen('https://raw.githubusercontent.com/dwyl/english-words/master/words.txt').read(), 'utf-8') Change the url in the urlopen function and replace all instances with your version of the above line. If you want to use a txt dictionary stored in your computer, then, well, nothing. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next