[go: up one dir, main page]

Showing 750 open source projects for "hash"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • GWI: On-demand Consumer Research Icon
    GWI: On-demand Consumer Research

    For marketing agencies and media organizations requiring a solution to get consumer insights

    Need easy access to consumer insights? Our intuitive platform is the answer. Get the ultra-reliable research that brands and agencies need to stay ahead of changing consumer behavior.
    Learn More
  • 1
    OhMyHash adalah program Bash sederhana yang dirancang untuk menghitung nilai Hash dari sebuah file menggunakan beberapa algoritma hashing, seperti MD5, SHA-1, SHA-256, dan SHA-512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Activation Key .NET Class Library

    Activation Key .NET Class Library

    Represents the activation key used to protect your C# application.

    A specific software-based key for a computer program C# source code. It certifies that the copy of the program is original. It is also called a license key, product key, product activation, software key and even a serial number. The key can be stored as a human readable text for easy transfering to the end user. Contains methods for generating the cryptography key based on the specified hardware and software binding. An additional feature is the ability to embed any information directly...
    Downloads: 44 This Week
    Last Update:
    See Project
  • 3
    Leader badge">
    Downloads: 177 This Week
    Last Update:
    See Project
  • 4
    LinAsm

    LinAsm

    Collection of fast and optimized assembly libraries for x86-64 Linux

    ...It implements many common and widely used algorithms for array manipulations: searching, sorting, arithmetic and vector operations, unit conversions; fast mathematical and statistic functions; numbers and time converting algorithms; finite impulse response (FIR) digital filters; spectrum analysis algorithms, Fast Hartley transformation; CPU cache friendly functions and extremely fast abstract data types (ADT) such as hash tables b-trees, and much more. LinAsm libraries are written on FASM assembly language. They are stable and have appropriate benchmarks for many units. All libraries are well documented and grouped by their functionality. To get more information about this library, please visit the official web site: http://linasm.sourceforge.net
    Downloads: 26 This Week
    Last Update:
    See Project
  • Melis Platform is an enterprise-grade Low Code Platform simplifying app creation, management, and delivery. Icon
    Melis Platform is an enterprise-grade Low Code Platform simplifying app creation, management, and delivery.

    Ideal for websites, apps, e-commerce, CRMs, and more

    Melis is a new generation of Content Management System and eCommerce platform to achieve and manage websites from a single web interface easy to use while offering the best of open source technology.
    Learn More
  • 5
    DC++

    DC++

    A Windows client for the Direct Connect networks

    DC++ is an open source Windows client for the Direct Connect file sharing network. The DC network is a decentralized network, made up of individual servers (hubs) that users join to share files with other members on that hub. Each hub is individually run by a fellow user of the DC network, and may have certain themes to the content on the hub. Hub owners set up rules to regulate their hub as they see fit.
    Leader badge">
    Downloads: 1,008 This Week
    Last Update:
    See Project
  • 6
    Password Keeper + Generator

    Password Keeper + Generator

    Free portable cross-platform graphical multi-user password manager

    Free portable cross-platform multi-user password manager, 100%-pure Java. DB for each pkg-user is encrypted and protected by pkg-user hash. In addition - passwords in DB are stored in encrypted form. In result - stored passwords are double encrypted ! Passwords of pkg-users are not stored in program - stored and compared only hashes. Support md2, md5, sha1, sha256, sha384 and sha512 hash. Support export DB to CSV, HTML, XLS or XML and import from CSV, XLS or XML. Simple and intuitive GUI - Graphical User Interface. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ALEPH-w

    ALEPH-w

    Data structures and Algorithms library

    ...It contains the main data structures: single and double lists, special arrays (dynamic and of bits), many types of trees: multitrees, binary search trees, avl, red-black, randomized, treaps, splay and other interesting types. Several types of hash tables are implemented: separated chaining, open adressing with linear probing and double function hash; this last one has a garbage colector mechanism that allows to free deleted entries. Dynamic linear hash tables are implemented too. The main algorithms on graphs are implemented in an easy way and with good performance features. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure Encryption algorithms currently known: AES-GCM, AES RIJNDAEL, PGP, AES (String Crypto 256 Bit Key) SERPENT, CHACHA20, XCHACHA20-POLY1305. ...
    Downloads: 11 This Week
    Last Update:
    See Project
  • 9
    cracking-actions

    cracking-actions

    a bruteforcer that can crack variety of files such as zip,rar & more

    cracking-actions is an open source software that allows you to crack passwords, files, etc... ,it targets windows and linux
    Downloads: 2 This Week
    Last Update:
    See Project
  • QA Wolf | We Write, Run and Maintain Tests Icon
    QA Wolf | We Write, Run and Maintain Tests

    For developer teams searching for a testing software

    QA Wolf is an AI-native service that delivers 80% automated E2E test coverage for web & mobile apps in weeks not years.
    Learn More
  • 10
    BimmerLink Log Analysis

    BimmerLink Log Analysis

    BMW / MINI Bimmerlink Log Visualizer

    ...It must not be used for real diagnostics, vehicle troubleshooting, or safety-critical decisions. For any official or accurate diagnosis, always rely on certified tools or professional automotive technicians. SHA256 hash of BimmerLogAnalyzer.exe: ae3c7cd66bf9f34736dc004a2ba4e92435e3736eac114b78ee02f0d14210d33a DETAIL; https://github.com/aaasci/bimmerlink_log_analysis
    Downloads: 6 This Week
    Last Update:
    See Project
  • 11
    React-Cryptographic-Toolkit

    React-Cryptographic-Toolkit

    A simple cryptographic toolkit built with React

    Disclaimer: The "React-Cryptographic-Toolkit" is an independent software application and is not affiliated with or endorsed by Meta Platforms, Inc. "React" is a registered trademark of Meta Platforms, Inc. This name is used solely for identification purposes. You can use this app to encrypt your data, hash strings, and calculate tags using the available HMAC algorithms. This app is provided with no warranty or guarantees of any kind. Use it at your own risk! Check it out at https://northstrix.github.io/React-Cryptographic-Toolkit/ The related article is available at https://medium.com/@Northstrix/react-and-cryptography-creating-my-own-toolkit-40944af4d534
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    ...The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. A filename conversion table is created to restore the concatenation order during a restore. The method aims to guarantee confidentiality, integrity, and availability of data, regardless of the trustworthiness of the chosen storage environment, while protecting against data breaches and unauthorized access. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Quaternion Lorentz

    Complex quaternion calculator with Lorentz boosts and rotations

    C++ code to perform the Lorentz boosts and rotations of special relativity using complex quaternions The interface is a complex quaternion console-based calculator with operations + - * / ^ and functions for Lorentz boosts and rotations. THEORY Complex quaternions have form q = A + B * I + C * J + D * K with A, B, C, D complex I * I = -1 , J * J = -1 , K * K = -1, I * J = K, J * I = -K , J * K = I,K * J = -I, K * I = J, I * K = -J Transpose T takes I into -I, J into -J, K...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    3DPass

    3DPass

    The Implementation of The Ledger of Things Node. Layer 1 decentralized

    ...It introduces a novel consensus mechanism called Proof of Scan, where miners validate by running recognition algorithms on 3D objects. Each object produces a reproducible cryptographic fingerprint (HASH ID) that is stored on-chain. If the same object is submitted again, the network rejects it, ensuring that only one of a kind assets can be registered. This approach enforces authenticity at the content level, something traditional file storage and NFT systems cannot achieve. The features of 3DPass include: Proof of Scan consensus, enforced uniqueness of 3D objects, CPU-only mining with no pools, object tokenization through the 3DPRC-2 standard, EVM compatibility, native web and mobile wallets, and open-source community governance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Dynamic Arrays and Hashes (Delphi, C++)

    Very fast classes for working with Dynamic Arrays in Delphi and C++

    ...Flexible memory control, functionality that standard containers do not have, fast operations (assembler implementation for x86 and x64 platforms). Available for Delphi all latest versions and for C++. Powerful Hash and Double Hash classes to work with pairs of values (key and value) and with values that have two keys (key1, key2, value). Give it a try and let me know how it works.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    twitch-batch-downloader

    Automate the download of entire Twitch.tv channels

    Automate the download of entire Twitch.tv channels with its metadata. Save each Twitch video into its own folder, with date and time values, video ID, stream metadata, frame screenshot, .ts parts list and sha256 hash. Keep the original ts files and generate mp4 files from them. It requires a shell and some command line utilities. See README.md for details in the Code/git section.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    Compiled Pastoral Edition

    Compiled Pastoral Edition

    The "Compiled Pastoral Edition" of the Holy Bible.

    ...Compiled Pastoral Edition of the Holy Bible. 2024(CCYY). 200 208 220 1 4 5 229 230 071 242 253 268 291 292 306 ~~~IDENTIFIER~~~ DC:IDENTIFIER:URN:CLSID:2A01069A-3C88-1042-60E5-EA4F92E3AE60 SOURCE:compiled-pastoral-edition-of-the-holy-bible HASH(SHA1):360c01347aecafcb1e181185e7cfd297ffe9f10b ~~~COPYRIGHT~~~ THIS PUBLICATION ("Compiled Pastoral Edition") IS PROTECTED BY COPYRIGHT (Copyright © 2024, ALEXANDER CAESAR N. ALMEDA), HOWEVER, RELEASED ON ANY JURISDICTION WORLDWIDE UNDER THE TERMS AND CONDITION ON MATTERS OF PUBLISHED WORKS OF PUBLIC DOMAIN. ~~~PUBLISHER~~~ ALEXANDER CAESAR N. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge">
    Downloads: 197 This Week
    Last Update:
    See Project
  • 19
    FileCentipede

    FileCentipede

    File centipede is an internet file download manager

    File centipede is an internet file download/upload manager, Torrent client, WebDAV client, FTP client, and SSH client. It's fast, customizable, user-friendly, multi-protocols supported, and free with no ads. It also contains many useful auxiliary tools such as HTTP requester, file merge, and encoders. With the browser integration, you can download audio and videos from websites, even encrypted videos. File centipede makes everything easy and efficient, it's the best internet download...
    Downloads: 54 This Week
    Last Update:
    See Project
  • 20
    RoboSuite 1.3

    RoboSuite 1.3

    The definitive solution to manage your backups and file copy operation

    # RoboSuite v1.3 - The Advanced RoboCopy GUI ## Introduction RoboSuite v1.3 is a powerful, free, and feature-rich graphical user interface (GUI) for the Windows command-line tool RoboCopy. Designed by Gianpaolo Aggiusti, this software elevates file copy and synchronization operations, making complex tasks simple and accessible to all users. Its purpose is to provide complete and intuitive control over RoboCopy, eliminating the need to memorize complex commands while adding a host of...
    Downloads: 42 This Week
    Last Update:
    See Project
  • 21

    C++ Complex Calculator

    C++ complex calculator with arrays, matrices, eigenvectors, functions

    ...Householder reduction is used for determinants, eigenvectors, and QR matrix factorization. Class Matrix and class Polynomial facilitate finding the characteristic polynomial. A hash table is used to do fast variable and function lookup (they are entries in the same table). Collisions are handled in the hash table by making each entry a linked list. Written as C++ classes using the STL libraries <complex> and <vector>. The Numerical Recipes routines zroots and laguer rewritten in C++ find the complex roots of a polynomial with complex coefficients. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    ProxyCrypt

    Encrypted volumes through command line

    ...See the documentation for more informations and an example of use: https://sourceforge.net/p/proxycrypt/doc/ Requirements: - Windows 7 or later - Arsenal Image Mounter or ImDisk Virtual Disk Driver - Administrative privileges - 64-bit CPU with SSE3 instructions - About 1 GB of RAM temporarily required for password checking with default settings Hashes of all versions: https://sourceforge.net/p/proxycrypt/doc/Hash
    Downloads: 16 This Week
    Last Update:
    See Project
  • 23
    Seditio

    Seditio

    Seditio CMS

    ...To install Seditio you need the following server software pre-installed: - WWW Server (Apache, nginx, etc) - PHP 5.4.0 or higher - MySQL 5.0.7 or higher - Server configuration You MUST ensure that PHP has been compiled with support for: - GD - Hash - Mbstring - MySQL - PCRE - Sessions
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    Custom Erase Algorithm by Mariano Ortu

    Custom Erase Algorithm by Mariano Ortu

    Secure file deletion algorithm with customizable overwrite patterns.

    This project provides a secure file deletion algorithm designed to permanently erase data by overwriting files with customizable patterns. It ensures that deleted files cannot be recovered by standard recovery tools, enhancing data privacy and security. The algorithm supports multiple overwrite passes with user-defined sequences, adapting to different security standards and user needs. It is implemented in C# with a focus on performance and reliability, suitable for integration into...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ...It is designed to offer for C programmers common data structures with powerful algorithms, and hidden implementation. Available structures are lists, queues, stacks, hash tables, binary trees, binary search trees, red-black trees, 2D arrays, permutations, heaps and interval heaps. GDSL is free software distributed under the terms of the GNU General Public License.
    Downloads: 0 This Week
    Last Update:
    See Project