The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning. Learn more →
Top 23 Hashing Open-Source Projects
-
CyberChef
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
Project mention: CyberChef VS DevToolboxWeb - a user suggested alternative | libhunt.com/r/CyberChef | 2024-02-06 -
C# Algorithms
:books: :chart_with_upwards_trend: Plug-and-play class-library project of standard Data Structures and Algorithms in C#
-
SurveyJS
Open-Source JSON Form Builder to Create Dynamic Forms Right in Your App. With SurveyJS form UI libraries, you can build and style forms in a fully-integrated drag & drop form builder, render them in your JS app, and store form submission data in any backend, inc. PHP, ASP.NET Core, and Node.js.
-
Project mention: Reverse Image Search Local Files? (NOT A DUPLICATE FINDER) | /r/software | 2023-05-22
-
deepdiff
DeepDiff: Deep Difference and search of any Python object/data. DeepHash: Hash of any object based on its contents. Delta: Use deltas to reconstruct objects by adding deltas together. (by seperman)
-
Project mention: A Step-by-Step Guide to Implement JWT Authentication in NestJS using Passport | dev.to | 2024-01-23
❓ Why is hashing and salting passwords mandatory? A salt is simply a random data used as an additional input to the hashing function to safeguard your password. The random string from the salt makes the hash unpredictable. A password hash involves converting the password into an alphanumeric string using specialized algorithms. Hashing and salting are irreversible and ensure that even if someone gains access to the hashed passwords, they will not be able to decrypt them to recover the original passwords. Hystorically bcrypt is recognized as the best hashing algorithm. However, in terms of robustness against all the new cryptographic attacks targeting hashing algorithms, the current clear winner is argon2. However, since the “youth" (2015) of this algorithm, I chose to use bcrypt
-
lazy_importer
library for importing functions from dlls in a hidden, reverse engineer unfriendly way
-
Name-That-Hash
🔗 Don't know what type of hash it is? Name That Hash will name that hash type! 🤖 Identify MD5, SHA256 and 300+ other hashes ☄ Comes with a neat web app 🔥
-
WorkOS
The modern identity platform for B2B SaaS. The APIs are flexible and easy-to-use, supporting authentication, user identity, and complex enterprise features like SSO and SCIM provisioning.
-
-
sirix
SirixDB is an an embeddable, bitemporal, append-only database system and event store, storing immutable lightweight snapshots. It keeps the full history of each resource. Every commit stores a space-efficient snapshot through structural sharing. It is log-structured and never overwrites data. SirixDB uses a novel page-level versioning approach.
We're using a similar trie structure as the main document (node) index in SirixDB[1]. Lately, I got some inspiration for different page-sizes based on the ART and HAMT basically for the rightmost inner pages (as the node-IDs are generated by a simple sequence generator and thus also all inner pages (we call them IndirectPage) except for the rightmost are fully occupied (the tree height is adapted dynamically depending on the size of the stored data. Currently, always 1024 references are stored to indirect child pages, but I'll experiment with smaller sized, as the inner nodes are simply copied for each new revision, whereas the leaf pages storing the actual data are versioned themselfes with a novel sliding snapshot algorithm.
You can simply compute from a unique nodeId each data is assigned (64bit) the page and reference to traverse on each level in the trie through some bit shifting.
-
-
-
-
-
-
-
-
ferrum
Features from the rust language in javascript: Provides Traits/Type classes & a hashing infrastructure and an advanced library for working with sequences/iterators in js (by adobe)
-
-
password4j
Java cryptographic library that supports Argon2, bcrypt, scrypt and PBKDF2 aimed to protect passwords in databases. Easy to use by design, highly customizable, secure and portable. All the implementations follow the standards and have been reviewed to perform better in the JVM.
Argon2 - https://password4j.com/
-
-
prvhash
PRVHASH - Pseudo-Random-Value Hash. Hash functions, PRNG with unlimited period, randomness extractor, and a glimpse into abyss. (inline C/C++) (Codename Gradilac/Градилак)
-
-
-
InfluxDB
Power Real-Time Data Analytics at Scale. Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
Hashing related posts
- Fast and compact minimal perfect hash functions in C++
- Password Hashing Package for Go
- haiti v2.1.0
- Inception: Leaking the root hash from /etc./shadow on AMD Zen 4 [video]
- ELI5: why is a password that uses numbers and letters stronger than one with only letters? the attackers don't know that you didn't use numbers, so they must include numbers in their brute force either way.
- Release v1.5.0 - Cyberpunk release · noraj/haiti
- Anyone know what causes intermittent corruption of random visual media files across drives and machines?
-
A note from our sponsor - WorkOS
workos.com | 28 Mar 2024
Index
What are some of the best open-source Hashing projects? This list will help you:
Project | Stars | |
---|---|---|
1 | CyberChef | 25,017 |
2 | C# Algorithms | 5,795 |
3 | imagededup | 4,921 |
4 | deepdiff | 1,876 |
5 | node-argon2 | 1,770 |
6 | lazy_importer | 1,451 |
7 | Name-That-Hash | 1,399 |
8 | ThreatExchange | 1,105 |
9 | sirix | 1,073 |
10 | zpl | 953 |
11 | aHash | 912 |
12 | Zero-Allocation-Hashing | 763 |
13 | haiti | 675 |
14 | password-hasher | 669 |
15 | crypto-hash | 629 |
16 | credential-plus | 525 |
17 | ferrum | 513 |
18 | noble-hashes | 457 |
19 | password4j | 326 |
20 | argon2-jvm | 321 |
21 | prvhash | 297 |
22 | util | 282 |
23 | binance-signature-examples | 224 |