http://www.open-source-security-software.net/project/TLSH/releases.atomRecent releases for TLSH2025-06-14T00:18:41.413167+00:00python-feedgenTLSH 3.9.2TLSH 3.9.22019-03-18T04:53:07+00:00Picked up following improvements.
3.5.0
Added the - force option
Allows a user to force the generation of digests for strings down to 50 characters long
3.5.1
Fixed the error in the Python extension
3.7.0
merged in various fixes - ifdef / added a SHA1 to the NOTICE.txt file / improved make.sh / improved regression tests / fixed the header file to resolve C++ standard violation. See README.md for details
3.7.1
resolved issue #29 - the force option for Python Step 1 - adding a regression test for strings approx of length 50 Step 2 - add python code
3.7.2
added code to set the distance parameters for ROC analysis to use these settings then change in CMakeLists.txt set(TLSH_DISTANCE_PARAMETERS 0) => set(TLSH_DISTANCE_PARAMETERS 1)
3.7.3
resolving internal issue #44
making static library the default
3.7.4
resolving internal issue #45
add a timing test for TLSH
$ bin/timing_unittest
build a buffer with a million bytes...
eval TLSH 50 times...
TLSH(buffer) = A12500088C838B0A0F0EC3C0ACAB82F3B8228B0308CFA302338C0F0AE2C24F28000008
BEFORE ms=1502905567631
AFTER ms=1502905573523
TIME ms=5892
TIME ms=117 per iteration
3.7.5
resolving internal issue #46
in include/tlsh_impl.h #define SLIDING_WND_SIZE 5 this can be varied between 4 to 8
3.8.0 Adding // access functions - required by tools using TLSH library
int Lvalue();
int Q1ratio();
int Q2ratio();
3.9.0 resolving internal issue #48 - tlsh_pattern program This tlsh_pattern program should read a pattern file
col 1: pattern number
col 2: nitems in group
col 3: TLSH
col 4: radius
col 5: pattern label The input options should match the tlsh program
usage: tlsh_pattern [-xlen] [-force] -pat pattern_file -f file
: tlsh_pattern [-xlen] [-force] -pat pattern_file -d digest
: tlsh_pattern [-xlen] [-force] -pat pattern_file -r dir
: tlsh_pattern [-xlen] [-force] -pat pattern_file -l listfile
3.9.1 resolving internal issue #38 putting in fix in rand_tags.cpp so that it generates identical output to previous version while safely working with pointers
3.9.2 18/Mar/2019
Also merged the contents of NOTICE.txt into LICENSE.
This was done because NOTICE.txt is sometimes accidently removed when people create their own version of this repository.
And the LICENSE specifically states that NOTICE.txt should NOT be removed.
Also added command line option -notice which displays the NOTICE.txt file
2019-03-18T04:53:07+00:00TLSH 3.10.0TLSH 3.10.02019-03-19T02:28:10+00:00<PRE>
3.9.3 fix to tlsh_pattern
3.9.4 fixing bug when calls to finish() update() done in invalid sequence
3.9.5 ./make.sh added -notest option
3.9.6 zero byte checksum option in Cmakefiles
3.9.7 fixing bin/timing_unittest
3.9.8 added distance calculations and -size option to bin/timing_unittest
3.9.9 remove dependancy on GNUInstallDirs
3.10.0 added to the API available for tools using TLSH
int BucketValue(int bucket);
int Checksum(int k);
</PRE>2019-03-19T02:28:10+00:00TLSH 3.11.0TLSH 3.11.02019-03-19T02:53:39+00:00fast version - see results in README.md under 3.11.0
definetly move to version 3.11.02019-03-19T02:53:39+00:00TLSH 3.13.1TLSH 3.13.12019-05-31T05:43:39+00:00windows alpha release
Please test in your Windows environment
2019-05-31T05:43:39+00:00TLSH 3.17.0TLSH 3.17.02019-07-19T05:28:55+00:00We have determined that the 256 byte limit was too conservative
TLSH appears to work down to approximately 50 bytes
So making the default behaviour to evaluate a digest for strings for 50 bytes and above2019-07-19T05:28:55+00:00TLSH 3.19.1TLSH 3.19.12020-03-25T10:48:20+00:00The final version 3 release with (old) 70 hex character digest
2020-03-25T10:48:20+00:00TLSH 4.2.0TLSH 4.2.02020-03-26T01:17:17+00:00Windows release using MinGW
see issue #782020-03-26T01:17:17+00:00TLSH 4.2.1TLSH 4.2.12020-03-26T20:03:49+00:00Windows release using MinGW
- resolved issue #78 ill formed JSON objects on Windows
- adding version identifier to the digest (T1)
- added output options (-o)
- added json object output (-ojson)
- added null digest (TNULL)
2020-03-26T20:03:49+00:00TLSH 4.6.0TLSH 4.6.02021-04-23T02:59:22+00:00Merged in fixes for
- issue 79 - divide by zero (very rare edge case)
- fixing python extension on PyPi
- fixes Java version on large files and T1 issue in Java version2021-04-23T02:59:22+00:00TLSH 4.7.2TLSH 4.7.22021-09-08T02:37:18+00:00
Updated package py-tlsh on Pypi.org
Merging in pull request that adds functions to Python package
lvalue, q1ratio, q2ratio, checksum, bucket_value and is_valid
regression tests for C++ and Python functions for:
lvalue, q1ratio, q2ratio, checksum, bucket_value
resolve issue #95 and #102 - (related to Python version numbers / Python environment)
2021-09-08T02:37:18+00:00TLSH 4.8.2TLSH 4.8.22021-09-09T05:58:13+00:00 Improve portability, add shared library build, install tlsh_unittest
Merged in pull request 103. Thanks to Dkapps for pull request 103
Merged in pull request 107. Thanks to cgull for pull request 107
It would appear that this release has no issues (so far)
We have modified the install and attempted to increase portability.
Please contact us or raise an issue if you have problems.2021-09-09T05:58:13+00:00TLSH 4.10.1TLSH 4.10.12021-10-01T07:04:52+00:004.10.x added Python tools for clustering file
using DBSCAN
using HAC-T
we provide scripts to show people how to cluster the Malware Bazaar dataset using TLSH
4.9.x added options -thread and -private
-thread the TLSH is evaluated with 2 threads (faster calculation)
Only done for files / bytestreams >= 10000 bytes
But this means that it is impossible to calculate the checksum
So the checksum is set to zero
-private
Does not evaluate the checksum
Useful if you do not want to leak information
Slightly faster than default TLSH (code was written to optimize this)
This is a pre-release
If there are any problems with this version, then please enter an issue2021-10-01T07:04:52+00:00TLSH 4.11.0TLSH 4.11.02021-10-11T06:01:54+00:004.11.0 added Jupyter notebook for analysis of Malware Bazaar
Pattern file for predicting malware family of unknown samples using Malware Bazaar clustering
4.10.x added Python tools for clustering file
using DBSCAN
using HAC-T
we provide scripts to show people how to cluster the Malware Bazaar dataset using TLSH
4.9.x added options -thread and -private
-thread the TLSH is evaluated with 2 threads (faster calculation)
Only done for files / bytestreams >= 10000 bytes
But this means that it is impossible to calculate the checksum
So the checksum is set to zero
-private
Does not evaluate the checksum
Useful if you do not want to leak information
Slightly faster than default TLSH (code was written to optimize this)
This is a pre-release
If there are any problems with this version, then please enter an issue
2021-10-11T06:01:54+00:00TLSH 4.11.2TLSH 4.11.22021-11-22T21:51:16+00:00Found issues with recent threading / use of stdc++ on CENTOS
Backed out some recent additions (threading)
TLSH now compiles on CENTOS 7 (broken for a few weeks)
This is candidate for production release2021-11-22T21:51:16+00:00