MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
Start Free
OpManager the network monitoring software used by over 1 million IT admins
Network performance monitoring, uncomplicated.
ManageEngine OpManager is a powerful network monitoring software that provides deep visibility into the performance of your routers, switches, firewalls, load balancers, wireless LAN controllers, servers, VMs, printers, and storage devices. It is an easy-to-use and affordable network monitoring solution that allows you to drill down to the root cause of an issue and eliminate it.
FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
Encryption/Decryption tool for words/hash/digits/encoded text
Word Cipher - KRIEG Technologies
Developed by: Northumber, KRIEG Technologies
This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into:
----- Text Ciphering -----
Albam Latin (Temurah)
Atbash Latin (Temurah)
Avgad Latin (Temurah)
Caesar Cipher
Flipped Text
----- Text Rotation -----
ROT5 (Digits)
ROT13 (Text)
ROT18 (Text & Digits)
ROT47
----- Text to Number -----
Binary
Hexadecimal
----- Text Encoding -----
Base 64
HTML Entities
----- Text Hashing -----
AES
MD5
SHA1 (160 bit)
SHA256
SHA384
SHA512
Word Cipher is a free-distributed software.
This WebOS application generates RFC 2289 standard compliant one-time passwords. It supports the MD4 and MD5 message-digest algorithms as well as the SHA-1 hash algorithm and can be used with challenge-response OTP systems such as OPIE and S/KEY.
For companies and organizations that need an email signature solution
With WiseStamp it’s easy to unify your brand and turn your emails into a powerful marketing tool.
Get the most out of your emails with a professionally designed custom email signature.
Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.
Lightweight File Integrity Checker. It will keep a database with a sha1/md5 fingerprint of your files and scan on command for any changes, added or deleted files. It can output to logfile, email, syslog or eventlog. Satisfies PCI-DSS 1.2 requirement
The MD5Revolution is a small tool to calculate the MD5 checksum of entered strings. More features and additionally information about the tool, can be found under: http://md5r.x303.cc/
A GUI Java utility to split a file into multiple chunks. A typical application is to copy a large file onto several floppies. It generates MD5 for each chunk.
BackUp Tool is a small Perl script that is periodically executed to created backups of certain projects/directory's and only adds the backup if changes have been made since the last time a backup has been made, to do this it makes use of md5 checksums.
Digital business card + lead capture + contact enrichment
Your complete in-person marketing platform
Share digital business cards, capture leads, and enrich validated contact info - at events, in the field, and beyond. Powered by AI and our proprietary data engine, Popl drives growth for companies around the world, turning every handshake into an opportunity.
RapidCRC is a tool for windows for checking and creating CRC32 and MD5 checksums (.sfv/.md5 files). Goal is to use the fastest available (assembly) implementations for this task. Specialty: direct support for CRC32 checksums stored in filenames.
sechk - SEcurity CHecKer
It is a powerful and useful tool to check if you got exploited and rooted, it will use checksum comparation via md5 sum, it exchanges file lists and csums from the sechk server. It\'s gonna work with all posixes and unixes.