SaaSHub helps you find the best software and product alternatives Learn more →
Top 18 C Hash Projects
-
john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
-
bitcracker
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
-
prvhash
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor, and a glimpse into abyss. (inline C/C++) (Codename Gradilac/Градилак)
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
komihash
Very fast, high-quality hash function, discrete-incremental and streamed hashing-capable (non-cryptographic, inline C/C++) 26GB/s + PRNG
-
beamsplitter
:gem: Beamsplitter - A new (possibly universal) hash that passes SMHasher. Built mainly with a random 10x64 S-box. Also in NodeJS
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
John The Ripper
Project mention: The One Billion Row Challenge in CUDA: from 17 minutes to 17 seconds | news.ycombinator.com | 2024-04-13> GPU Hash Table?
How bad would performance have suffered if you sha256'd the lines to build the map? I'm going to guess "badly"?
Maybe something like this in CUDA: https://github.com/Cyan4973/xxHash ?
Project mention: How to bypass the admin password when Windows(C:) is locked with bitlocker? | /r/Windows11 | 2023-09-13Clean reinstall. Or try bitcracker : https://github.com/e-ago/bitcracker
Project mention: Does python have a siphash implementation ready to use? | /r/learnpython | 2023-09-05I am playing with some dict implementation and so far I have either used murmur hash library or some custom bit manipulation.
the lib i used as base its : https://github.com/amosnier/sha-2
Project mention: Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video] | news.ycombinator.com | 2023-08-08when you look properly at the end of the video the root hash starts with $y$ implying its yescrypt
more info here https://manpages.debian.org/unstable/libcrypt-dev/crypt.5.en...
https://www.openwall.com/yescrypt/
once you have the hash you have to use some rainbow tables if they exist for that hash function or bruteforce it
the authors of yescrypt claim: "Technically, yescrypt is the most scalable password hashing scheme so far, providing near-optimal security from offline password cracking across the whole range from kilobytes to terabytes and beyond. "
in any way, this is a local attack, someone / some software on your local machine would need to execute it so i am not overly stressed, password hashes leak all the time from all different sources
yet, it does worry me because my AMD stock is dropping on value because of this today :D
Project mention: How do crypto functions deal with the issue of character size? (e.g. Unicode) | /r/cryptography | 2023-06-18Hey guys. If you remember me from several months ago, with this object de art, I am here with a less cringy question than that of 'I made a hash function!!!111'. I apologize if this question is basic btw. My question is, how do crypto functions, of any kind, deal with character size? For example in C, wchar_t is either 2 or 4 bytes. So, if the implementation goes through the stream like stream++ it will be stepping word-wise not byte-wise. And then if another machine, using a different implementation, reads the stream byte-wise and not word-wise, then it won't get the same message right?
C Hash related posts
- The One Billion Row Challenge in CUDA: from 17 minutes to 17 seconds
- Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video]
- GitHub - frymimori/c-hasher: Create secure and variable-length checksums using C with a fast and unique hashing algorithm.
- Proof_Math_Is_Engineered: never-seen-before mind-blowing imagery discovered, with "original sin" consonants (for a layman)
- Wyhash: The fastest quality hash function
- What Are Your Thoughts on This Claim To Have Discovered Mathematical Evidence for God?
- Quickly checking that a string belongs to a small set
-
A note from our sponsor - SaaSHub
www.saashub.com | 26 Apr 2024
Index
What are some of the best open-source Hash projects in C? This list will help you:
Project | Stars | |
---|---|---|
1 | john | 9,267 |
2 | xxHash | 8,462 |
3 | wyhash | 913 |
4 | bitcracker | 764 |
5 | gtkhash | 352 |
6 | mmh3 | 303 |
7 | prvhash | 297 |
8 | TairHash | 227 |
9 | komihash | 176 |
10 | sha-2 | 175 |
11 | houndsniff | 151 |
12 | yescrypt | 114 |
13 | beamsplitter | 88 |
14 | nbperf | 13 |
15 | hash-array-mapped-trie | 9 |
16 | stata-shasum | 7 |
17 | PoxHash | 7 |
18 | ZedmeeHash | 1 |
Sponsored