Showing 21 open source projects for "hash function"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 1
    HighwayHash

    HighwayHash

    Fast strong hash functions: SipHash/HighwayHash

    HighwayHash is a fast, keyed hash function intended for scenarios where you need strong, DoS-resistant hashing without the full overhead of a general-purpose cryptographic hash. It’s designed to defeat hash-flooding attacks by mixing input with wide SIMD operations and a branch-free inner loop, so adversaries can’t cheaply craft many colliding keys. The implementation targets multiple CPU families with vectorized code paths while keeping a portable fallback, yielding high throughput across platforms. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Modsurfer

    Modsurfer

    Modsurfer provides ops & dev teams with a system of record

    Modsurfer provides ops & dev teams with the first system-of-record and diagnostics application to search, browse, validate, audit, and investigate WebAssembly binaries. At-a-glance insights into WebAssembly module data (code size & complexity, imports/exports & more). Search for details about modules (hash, ID, function names, strings, namespaces, errors & more). Easily audit and track all the WebAssembly code in your stack. Debug & triage issues otherwise difficult to pinpoint in opaque WebAssembly format. Write or generate a "check file" to track binary requirements. If a module fails validation, a helpful report is created to get things back on track. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Serverless Offline

    Serverless Offline

    Emulate AWS λ and API Gateway locally

    ...Once you run a function that boots up the Docker container, it'll look through the layers for that function, download them in order to your layers folder, and save a hash of your layers so it can be re-used in future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    DeepCopy

    DeepCopy

    Create deep copies (clones) of your objects

    ...You use __clone() and implement the behavior yourself. DeepCopy recursively traverses all the object's properties and clones them. To avoid cloning the same object twice it keeps a hash map of all instances and thus preserves the object graph. Alternatively, you can create your own DeepCopy instance to configure it differently. You may want to roll your own deep copy function. You can add filters to customize the copy process. DeepCopy\Matcher applies on a object attribute. DeepCopy\TypeMatcher applies on any element found in graph, including array elements. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Self-hosted n8n: No-code AI workflows Icon
    Self-hosted n8n: No-code AI workflows

    Connect workflows. Integrate data

    A free-to-use workflow automation tool, n8n lets you connect all your apps and data in one customizable, no-code platform. Design workflows and process data from a simple, unified dashboard.
    Learn More
  • 5
    Tiny CUDA Neural Networks

    Tiny CUDA Neural Networks

    Lightning fast C++/CUDA neural network framework

    This is a small, self-contained framework for training and querying neural networks. Most notably, it contains a lightning-fast "fully fused" multi-layer perceptron (technical paper), a versatile multiresolution hash encoding (technical paper), as well as support for various other input encodings, losses, and optimizers. We provide a sample application where an image function (x,y) -> (R,G,B) is learned. The fully fused MLP component of this framework requires a very large amount of shared memory in its default configuration. It will likely only work on an RTX 3090, an RTX 2080 Ti, or high-end enterprise GPUs. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Go Recipes

    Go Recipes

    Collection of handy tools for Go projects

    Visualize the distribution of code coverage in your project. This helps to identify code areas with high and low coverage. Useful when you have a large project with lots of files and packages. This 2D image-hash of your project should be more representative than a single number. For each module, the node representing the greatest version (i.e., the version chosen by Go's minimal version selection algorithm) is colored green. Other nodes, which aren't in the final build list, are colored grey...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Node Redis

    Node Redis

    A high performance Node.js Redis client

    This library is a 1 to 1 mapping of the Redis commands. Each Redis command is exposed as a function on the client object. All functions take either an args Array plus optional callback Function or a variable number of individual arguments followed by an optional callback. Node Redis currently doesn't natively support promises (this is coming in v4), however you can wrap the methods you want to use with promises using the built-in Node.js util.promisify method on Node.js >= v8. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations...
    Downloads: 24 This Week
    Last Update:
    See Project
  • 9
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design — ARX-based sponge resistant to Grover-type attacks. Context and salt separation — unique hashing domains for each use-case. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • BrandMail Email Signatures for Outlook Icon
    BrandMail Email Signatures for Outlook

    Leverage every email as an opportunity to brand consistently and minimise the security risks associated with the tampering of HTML signatures.

    BrandMail®, developed by BrandQuantum, is a software solution that seamlessly integrates with Microsoft Outlook to empower every employee in the organisation to automatically create consistently branded emails via a single toolbar that provides access to brand standards and the latest pre-approved content.
    Learn More
  • 10

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes:...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    hashmap

    hashmap

    A Golang lock-free thread-safe HashMap optimized for fastest access

    ...The Get() function contains helper functions that have been inlined manually until the Golang compiler will inline them automatically. It optimizes the slice access by circumventing the Golang size check when reading from the slice.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    JavaScript MD5

    JavaScript MD5

    Compatible with server-side environments like node.js

    ...It allows you to generate MD5 hashes from strings, arrays, ArrayBuffers, and other binary-like data types, making it useful for checksums, fingerprinting, and simple integrity checks on the client or server. The library is exposed as a plain function, so usage is as simple as calling md5(value) and receiving the 32-character hexadecimal hash. It supports multiple packaging formats, including UMD, making it easy to drop into legacy codebases as well as modern bundlers like webpack or Browserify. A comprehensive test suite and demo page are provided to validate behavior across platforms and edge cases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    hashcat GUI Toolkit
    A Windows GUI program that helps to set various parameters of hashcat. The following programs are not included, and should be provided by user. - hashcat (v6.1.1 was used and tested for this project) - CAP, HCCAPX file converter. Free as it is, I have no obligation to update, upgrade or debug it on demand.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Heap Allocation Monitor Library

    Heap Allocation Monitor Library

    Heap Allocation Monitor Library is a toolset written in C++ that consists of a statically linked monitoring library and a parser, to accommodate the creation (by a monitored executable of choice) of a report indicating which heap memory allocations are yet to be released by the time the monitoring library, linked with that executable, is instructed to do so. The parser tool can then be applied onto the generated file to translate it to a human readable format indicating function names and line numbers in the sources of the monitored application, indicating where the yet to be released allocations took place. See the "doc" folder for usage information. Note: In order to run the unit tests associated with the hash table you must download Catch2 unit test framework from https://github.com/catchorg/Catch2, so that it is located next to the "common", "haml" and "haml_parser" folders.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    ...The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes. Just as importantly, the default parameters are sensible: SJCL strengthens your passwords by a factor of 1000 and salts them to protect against rainbow tables, and it authenticates every message it sends to prevent it from being modified. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ALEPH-w

    ALEPH-w

    Data structures and Algorithms library

    ...It contains the main data structures: single and double lists, special arrays (dynamic and of bits), many types of trees: multitrees, binary search trees, avl, red-black, randomized, treaps, splay and other interesting types. Several types of hash tables are implemented: separated chaining, open adressing with linear probing and double function hash; this last one has a garbage colector mechanism that allows to free deleted entries. Dynamic linear hash tables are implemented too. The main algorithms on graphs are implemented in an easy way and with good performance features. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Simple XML Parse

    This is a simple and fast XML parser based on a recursive function.

    This XML Parser does not do much validation but is fast and simple. Currently, I think, it handles everything including CDATA. There are two styles, both resulting in a Perl hash.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    zsh-git-prompt

    zsh-git-prompt

    Informative git prompt for zsh

    zsh-git-prompt is a Z shell prompt script that displays rich Git repository information in your shell prompt, such as branch, ahead/behind status, staged changes, conflicts, and more. It enhances developer productivity in version-controlled workflows. There is now a Haskell implementation as well, which can be four to six times faster than the Python one. The reason is not that Haskell is faster in itself (although it is), but that this implementation calls git only once. You may redefine...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    NotOpeningTwiceDLL

    This DLL prevents your program to run two instances simultaneously

    This DLL checks if your program is already running and controls what has to be done if this is the case. What is new is that it not only checks if the processnames are the same, but also checks if the sha512 hashes are the same. If the names are the same but the hashes are not, apparently there is another program with the same name, but now, it will no longer stop your program from running, while still not opening multiple instances! This DLL is written in vb.NET.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    libhash

    libhash

    Thread safe hash library

    ...If you have special needs you can substitute your on hash calculation function for the built in one. There is also a library call that allows you to judge the efficiency of your hash function. The library has complete HTML documentation. And several tests of the library can be run with "make check".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Hash Monster
    A versatile gui and console application capable of generating and comparing hashes using a variety of popular hashing libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next