There are 4 repositories under hashing-algorithms topic.
:books: :chart_with_upwards_trend: Plug-and-play class-library project of standard Data Structures and Algorithms in C#
Penetration Testing and Hacking CTF's Swiss Army Knife with: Reverse Shell Handling - Encoding/Decoding - Encryption/Decryption - Cracking Hashes / Hashing
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor, and a glimpse into abyss. (inline C/C++) (Codename Gradilac/Градилак)
Go package porting the standard hashing algorithms to a more efficient implementation.
A collection of classical algorithms and data-structures implementation in C++ for coding interview and competitive programming
Cryptographic hash functions for Kotlin Multiplatform
A .NET implementation of several non-cryptographic hashes.
A hash utility, est. 2002, FLOSS. 489 hash functions, HMAC support, cross platform, feature-rich, multi threaded. CLI and API. Recursive hashing, predefined and customizable formats, verify data integrity and find ok/failed/missing/new files, find files by their hashes, find the hash function to a hash. GUI provided by HashGarten.
Ultra fast, high-quality hash functions for hash-tables and hash-maps (non-cryptographic, inline C/C++) + PRNG
Message Authentication Code algorithms for Kotlin Multiplatform
Find similar images in several directories by aHash/dHash/pHash.
Quantum-Resistant Cryptographic Hash Library for Password Hashing and Verification 🦀
Laravel wrapper for common hashing algorithms used in web applications
A cross-platform Swing GUI for Jacksum.
🌱Contribute in Hacktoberfest 2022 by contributing Data Structures and Algorithms Code in any programming language. Create your own issues. ✨Star it 🍴Fork it and Contribute to it <3
A file-based malware removal tool that contains a list of MD5 hashes from known malware, compares them with a selected file, and determines if it's malware. The user then has the option to delete the file from the computer.
Data Structures and Algorithms - Sharif University of Technology
Unsupervised Hashing algorithms in python
Cyclic Redundance Check hashing algorithm implemented in python
An optimized JavaScript implementation of the MurmurHash3 algorithm.
This is my second project about File Organization. It's all about Perfect Hashing Cichelli’s Algorithm.
The Cipher Toolkit Built For All Skill Levels
RPO-M31 and XHash-M31: Efficient Hash Functions for Circle STARKs
A collection of basic python scripts that I wrote
simple hash functions in go: a simple hash function implementing Horner's rule and a universal hash function implementing the Carter-Wegman method.
Here I have kept some algorithms that I implemented ...
BLAKE3 binding for Swift.
A thorough introduction into the world of ciphers, their history, security and code implementation.
All kind of encryption in one program.
knotty, a CLI tool for cracking and computing hashes, and generating rainbow tables in 50+ hashing algorithms.