SaaSHub helps you find the best software and product alternatives Learn more →
Top 17 C Hash Projects
-
john
John the Ripper jumbo - advanced offline password cracker, which supports hundreds of hash and cipher types, and runs on many operating systems, CPUs, GPUs, and even some FPGAs
-
Project mention: Day 64: Implementing a basic Bloom Filter Using Java BitSet api | dev.to | 2022-12-30
Examples of fast, simple hashes that are independent enough includes murmur, xxHash, Fowler–Noll–Vo hash function and many others
-
InfluxDB
Collect and Analyze Billions of Data Points in Real Time. Manage all types of time series data in a single, purpose-built database. Run at any scale in any environment in the cloud, on-premises, or at the edge.
-
-
bitcracker
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Project mention: How to bypass the admin password when Windows(C:) is locked with bitlocker? | /r/Windows11 | 2023-09-13Clean reinstall. Or try bitcracker : https://github.com/e-ago/bitcracker
-
-
prvhash
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor, and a glimpse into abyss. (inline C/C++) (Codename Gradilac/Градилак)
Project mention: Proof_Math_Is_Engineered: never-seen-before mind-blowing imagery discovered, with "original sin" consonants (for a layman) | /r/programming | 2023-03-12 -
-
Onboard AI
Learn any GitHub repo in 59 seconds. Onboard AI learns any GitHub repo in minutes and lets you chat with it to locate functionality, understand different parts, and generate new code. Use it for free at www.getonboard.dev.
-
the lib i used as base its : https://github.com/amosnier/sha-2
-
-
komihash
Very fast, high-quality hash function, discrete-incremental and streamed hashing-capable (non-cryptographic, inline C/C++) 26GB/s + PRNG
Project mention: Streamed Hashing Added to Komihash 4.6. Very Fast Hash Function (in C), competitor to xxhash, wyhash. Java port available. | /r/programming | 2022-12-06 -
Project mention: Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video] | news.ycombinator.com | 2023-08-08
when you look properly at the end of the video the root hash starts with $y$ implying its yescrypt
more info here https://manpages.debian.org/unstable/libcrypt-dev/crypt.5.en...
https://www.openwall.com/yescrypt/
once you have the hash you have to use some rainbow tables if they exist for that hash function or bruteforce it
the authors of yescrypt claim: "Technically, yescrypt is the most scalable password hashing scheme so far, providing near-optimal security from offline password cracking across the whole range from kilobytes to terabytes and beyond. "
in any way, this is a local attack, someone / some software on your local machine would need to execute it so i am not overly stressed, password hashes leak all the time from all different sources
yet, it does worry me because my AMD stock is dropping on value because of this today :D
-
beamsplitter
:gem: Beamsplitter - A new (possibly universal) hash that passes SMHasher. Built mainly with a random 10x64 S-box. Also in NodeJS
-
Project mention: Quickly checking that a string belongs to a small set | news.ycombinator.com | 2022-12-30
-
-
Project mention: How do crypto functions deal with the issue of character size? (e.g. Unicode) | /r/cryptography | 2023-06-18
Hey guys. If you remember me from several months ago, with this object de art, I am here with a less cringy question than that of 'I made a hash function!!!111'. I apologize if this question is basic btw. My question is, how do crypto functions, of any kind, deal with character size? For example in C, wchar_t is either 2 or 4 bytes. So, if the implementation goes through the stream like stream++ it will be stepping word-wise not byte-wise. And then if another machine, using a different implementation, reads the stream byte-wise and not word-wise, then it won't get the same message right?
-
-
-
SaaSHub
SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives
C Hash related posts
- Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video]
- GitHub - frymimori/c-hasher: Create secure and variable-length checksums using C with a fast and unique hashing algorithm.
- Proof_Math_Is_Engineered: never-seen-before mind-blowing imagery discovered, with "original sin" consonants (for a layman)
- Wyhash: The fastest quality hash function
- What Are Your Thoughts on This Claim To Have Discovered Mathematical Evidence for God?
- Quickly checking that a string belongs to a small set
- Is this guy even talking about anything?
-
A note from our sponsor - #<SponsorshipServiceOld:0x00007f0fa007c950>
www.saashub.com | 1 Dec 2023
Index
What are some of the best open-source Hash projects in C? This list will help you:
Project | Stars | |
---|---|---|
1 | john | 8,544 |
2 | xxHash | 7,935 |
3 | wyhash | 847 |
4 | bitcracker | 719 |
5 | gtkhash | 323 |
6 | prvhash | 292 |
7 | TairHash | 223 |
8 | sha-2 | 166 |
9 | houndsniff | 151 |
10 | komihash | 136 |
11 | yescrypt | 103 |
12 | beamsplitter | 87 |
13 | nbperf | 11 |
14 | hash-array-mapped-trie | 9 |
15 | PoxHash | 7 |
16 | stata-shasum | 7 |
17 | ZedmeeHash | 1 |