[go: up one dir, main page]

Showing 77 open source projects for "hash"

View related business solutions
  • La version gratuite d'Auth0 s'enrichit ! Icon
    La version gratuite d'Auth0 s'enrichit !

    Gratuit pour 25 000 utilisateurs avec intégration Okta illimitée : concentrez-vous sur le développement de vos applications.

    Vous l'avez demandé, nous l'avons fait ! Les versions gratuite et payante d'Auth0 incluent des options qui vous permettent de développer, déployer et faire évoluer vos applications en toute sécurité. Utilisez Auth0 dès maintenant pour découvrir tous ses avantages.
    Essayez Auth0 gratuitement
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 1
    JDiskMark

    JDiskMark

    Java Disk Benchmark Utility

    ... Verify 0.6.1 download w SHA-256 Hash: B120C499ED49D934D0E48D265CB7D6B789940CA00ACF71435F8BA68D68802F9E Instructions to verify file SHA-256 signature: https://sourceforge.net/p/jdiskmark/wiki/%20Verifying%20SHA-256%20Hash%20on%20Windows%20with%20PowerShell/ ZIP releases require java to be installed separately: * v0.5.0-v0.6.0 >Java 21 * v0.1-v0.4 > Java 8 user manual: https://github.com/jDiskMark/jdm-java/wiki/0.6.0-User-Manual
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    The program allows you to generate the hashes with the chosen algorithm (MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512) of a single file or an entire folder (you can choose to scan the folder recursively or not recursively). It supports drag and drop of files and folders. The hash can be exported to text files. Compiled with openjdk 8. Usage: param 1: exclude symbolic links (0 or 1) [mandatory], param 2: exclude hidden files (0 or 1) [mandatory], param 3: folders to exclude [optional...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Password Keeper + Generator

    Password Keeper + Generator

    Free portable cross-platform graphical multi-user password manager

    Free portable cross-platform multi-user password manager, 100%-pure Java. DB for each pkg-user is encrypted and protected by pkg-user hash. In addition - passwords in DB are stored in encrypted form. In result - stored passwords are double encrypted ! Passwords of pkg-users are not stored in program - stored and compared only hashes. Support md2, md5, sha1, sha256, sha384 and sha512 hash. Support export DB to CSV, HTML, XLS or XML and import from CSV, XLS or XML. Simple and intuitive GUI...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard. Icon
    Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard.

    For developers, engineers, and operational teams in organizations of all sizes

    Monitor everything you run in your cloud without compromising on cost, granularity, or scale. groundcover is a full stack cloud-native APM platform designed to make observability effortless so that you can focus on building world-class products. By leveraging our proprietary sensor, groundcover unlocks unprecedented granularity on all your applications, eliminating the need for costly code changes and development cycles to ensure monitoring continuity.
    Learn More
  • 5
    mystic-crypt is designed as a Java library that can be used for simple and complex encryption and decryption. The source code for the library is available under https://github.com/astrapi69/mystic-crypt For demonstration what the library can do there is a graphical client: The source code for the ui is available under https://github.com/astrapi69/mystic-crypt-ui
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    KeyHolder password manager

    KeyHolder password manager

    Store your passwords in an offline encrypted file!

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    dirsynch

    dirsynch

    Directory synchronization tool

    DirSynch is a bidirectional directory synchronizing software. It helps you to discover the status of each file in both directories: if it's only in one of them, if it's newer in one than in the other, or if they are simply equal. It also support file content comparison using a hash function, although it's very time consuming. After letting you to choose which files do you want to synchronize, it performs the right operations to make both directories equal (or not, if you want it different...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    HOFAT - Hash Of File And Text

    HOFAT - Hash Of File And Text

    HOFAT - graphical Hash Of File And Text calculator, 100%-pure Java

    HOFAT - graphical Hash Of File And Text calculator utility (Message Digest), 100%-pure Java, portable and cross-platform. Support md2, md5, sha1, sha256, sha384 and sha512 hashes. Simple and intuitive GUI - Graphical User Interface. Developed with Java Spring Framework. Tested in Windows/Linux. Need Jre-1.8 - https://www.oracle.com/java/technologies/javase/javase8-archive-downloads.html. Source - https://github.com/harp077/hofat/ If you like this - put a star on https://github.com/harp077...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Jacksum

    Jacksum

    a free cross platform checksum utility, supports 58+ hash algorithms

    Development of this project has been moved to https://github.com/jonelo/jacksum. This site has been left for historical purposes ONLY, you find older Jacksum versions here. Please visit the GitHub site for current development. Jacksum 1.7.0 is a platform independent checksum utility (written entirely in Java) for computing and verifying (integrity check) checksums, CRC and hashes (fingerprints). It supports 58 popular hash algorithms and a lot of unique features.
    Downloads: 1 This Week
    Last Update:
    See Project
  • ManageEngine Endpoint Central for IT Professionals Icon
    ManageEngine Endpoint Central for IT Professionals

    A one-stop Unified Endpoint Management (UEM) solution

    ManageEngine's Endpoint Central is a Unified Endpoint Management Solution, that takes care of enterprise mobility management (including all features of mobile application management and mobile device management), as well as client management for a diversified range of endpoints - mobile devices, laptops, computers, tablets, server machines etc. With ManageEngine Endpoint Central, users can automate their regular desktop management routines like distributing software, installing patches, managing IT assets, imaging and deploying OS, and more.
    Learn More
  • 10
    Mahuta

    Mahuta

    IPFS Storage service with search capability

    Mahuta (formerly known as IPFS-Store) is a library to aggregate and consolidate files or documents stored by your application on the IPFS network. It provides a solution to collect, store, index, cache and search IPFS data handled by your system in a convenient way.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    sls

    SLS Team Java Library

    Java library with Cryptographic algorithms. Easy to use Crypto algorithms. Works on Windows, Linux, Android. No external lib dependencies, no useless abstractions, no 'crypto provider'. Elliptic curves was borrowed from BouncyCastle and simplified a lot. Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them. With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example. No...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Our idea is to deploy a society of computational agents that collaborate in order to achieve the shared goal of decrypting a chunk of ciphertext or recovering a password from an hash by means of a dictionary-based attack.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    With this tool you are able to test different hashes: - MD2 - MD5 - SHA1 - SHA224 - SHA256 - SHA384 - SHA512 Recommended Java 8 For any questions you may use the ticketing system .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Voldemort

    Voldemort

    A distributed key-value storage system

    ...-tolerant hash table. This doesn’t make it ideal for all applications but does offer unique advantages, such as the ability to read and write scale horizontally, and the ability to combine in memory caching with the storage system so that a separate caching tier is not required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    With this Program you may: - Check signatures of Files, as md2, md5, sha1, sha224, sha256, sha384 sha512 - Comparing Strings To start it in Windows or Linux, you may use the command "java -jar nameOfFile.jar". Or using the .bat - file for Windows, I added as example. For Linux you may try to create a bash file for double clicking. It's recommended to use Java 8.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Hash

    Hash

    Hash: File Checksum Generator

    Hash is fast and simple java utility program for calculating and verifying checksums for files and text. Hash can generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 checksum values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    JChecksum

    JChecksum

    MD5 Checksum Tool

    This tool checks the integrity of files. It is very important if you don’t want your computer to get infected with viruses and malware. Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files. This tool enables you to verify the file integrity of the downloaded...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Directory control

    Hot directory

    Control changes in the choosen folder. Choose a log file with the changes within. It's recommended to use Java 8. The directory is not controlled recursively, thus if files are added or deleted in other folders it is not showed. Only things in the folder choosen. Just start a new pararell session to control another folder. Start it with "java -jar file.jar" or with the .bat file as example. You may also start it in the background with "start javaw -jar DirecHashC.jar" .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    rubycollect4j

    Ruby Collections for Java

    The rubycollect4j implements all methods refer to Ruby Array, Hash and Enumerable. For further info, please visit http://ruby-doc.org website. For more documentation, please read JavaDoc. With Java 8: // Sort the characters by its frequency based on the word 'Mississippi' case-insensitively RubyArray<String> word = ra("Mississippi".split("(?!^)")); String result = word.map((c) -> { return c.toLowerCase(); }).sortBy((c) -> { return word.count(c); }).uniq().join(); p...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PIAX is a middleware to support P2P based information services. PIAX provides scalable, fault-tolerant and easy-to-use application platform that integrates structured overlays and mobile agents. As structured range-queriable overlays, skip graph and suzaku (chord#-based overlay) are implemented. Based-on these overlays, LL-Net(location-based discovery), DOLR(name-based discovery), DHT(distributed hash tables) features are provided.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    jPass - Cross-Platform Password Manager

    jPass - Cross-Platform Password Manager

    Compiled into a single .jar file. Tiny Password Manager. Portable

    I did not see a pre-built version of this software on the original developers Github project (https://github.com/gaborbata/jpass), so I am taking it upon myself to compile the releases as they come, so that others don't have to. --Description-- JPass is a simple, small, portable password manager application with strong encryption. It allows you to store user names, passwords, URLs and generic notes in an encrypted file protected by one master password. I will not add the source...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Advanced Checksum Verifier Utility
    Advanced CVU is an open source GUI software for calculating checksum and verifying file integrity. Supported checksums: - MD5 (Message Digest 5) - SHA-1 (Secure Hash Algoritm) - SHA-256 (Secure Hash Algoritm) - SHA-512 (Secure Hash Algoritm) - CRC32 (Cyclic Redundancy Check) - Adler-32 (RFC 1950) Java Runtime Environment (JRE) 1.8 must be installed for proper running.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Immutable Collections for Java

    Immutable/Persistent Collections Library

    Library providing immutable/persistent collection classes for Java. While collections are immutable they provide methods for adding and removing values by creating new modified copies of themselves. Each copy shares as much as possible of its structure with other copies to minimize memory consumption. The library includes a singly linked (cons/cddr style) list/stack, an integer trie based indexed list, a 2-3 tree based random access indexed list, a 2-3 tree based map, a hash trie based map...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Checksum Directory

    Checksum Directory

    Check some checksum!

    A secure and centralized way to get checksums of common downloads. You will find the usual MD5 hash, but also the newer and more secure hashes like SHA-1, SHA-256 and even SHA-512. If the filesize and all up to four hashes match, you should be save to use that downloaded file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next