[go: up one dir, main page]

Search Results for "sha256 hash calculater" - Page 2

Showing 59 open source projects for "sha256 hash calculater"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard. Icon
    Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard.

    For developers, engineers, and operational teams in organizations of all sizes

    Monitor everything you run in your cloud without compromising on cost, granularity, or scale. groundcover is a full stack cloud-native APM platform designed to make observability effortless so that you can focus on building world-class products. By leveraging our proprietary sensor, groundcover unlocks unprecedented granularity on all your applications, eliminating the need for costly code changes and development cycles to ensure monitoring continuity.
    Learn More
  • 1
    Felix Hash Tool

    Felix Hash Tool

    File Integrity Check Program

    File Integrity Check Program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hash Calculator

    Hash Calculator

    Simple Hash Calculator

    This program will allow you to manually type, or browse for a file on your system. You will then be able to generate a MD5, SHA256, or SHA512 hash digest of this file. This program requires no installation and is intended to be a simple, lightweight program. This is also my first open source project!
    Downloads: 6 This Week
    Last Update:
    See Project
  • 3

    Duplinator

    Duplicate finder and processor. uses SHA256 file hash.

    Identifies duplicate files by computing SHA256 hash of file contents. provides options to either hardlink, delete, or create shortcuts to duplicated files. Hardlink is the recommended option for most complicated file copy problems (like old file systems with lots of stuff on used by lots of people), as both copies remain identical, and disk space is minimised.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Quick Hash GUI

    Quick Hash GUI

    Linux, Windows and Apple Mac File Hashing GUI Tool

    This project has moved to www.quickhash-gui.org as of 2016-12-04. I kept v2.6.9.2 and below hosted here since Dec 16 but too many people were ignoring the fact that no updates were being posted here. For the latest QuickHash v2.8.4 release (Aug 28th 2017), go to www.quickhash-gui.org, and note that as of 29/12/16 a Debian package is also available
    Downloads: 0 This Week
    Last Update:
    See Project
  • Optimize every aspect of hiring with Greenhouse Recruiting Icon
    Optimize every aspect of hiring with Greenhouse Recruiting

    Hire for what’s next.

    What’s next for many of us is changing. Your company’s ability to hire great talent is as important as ever – so you’ll be ready for whatever’s ahead. Whether you need to scale your team quickly or improve your hiring process, Greenhouse gives you the right technology, know-how and support to take on what’s next.
    Learn More
  • 5
    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Anti-Cryptography

    Juggernaut v1000 can crack MD4, MD5, MD6, SHA1, SHA256, SHA384, SHA512, HMAC-MD5, HMAC-SHA1 and also all the Base-64 version of them in minutes... but the cracking process depends in your password wordlist/dictionary.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6

    dotNet File Hash

    An implementation of various hashing algorithms in C# 4.0

    This is a C# .Net 4.0 file hashing Windows application that implements a variety of hashing algorithms (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD160) readily available in the System.Security.Cryptography section of the .Net framework and can be used to compare files from various folders for true file duplications by directly hashing the content and ignoring other extended details. The application UI is pretty crude, but the underlying code is quite lean. As always, this application is an...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    hash security is windows linux unix mac os security tools. Software name: hash security Software version: V1.0.0.0 All rights reserved: hash security Official site: http://www.hashsecurity.com Official email: hashsecurity@gmail.com Hash Security V1.0.0.0 released date: 2015-12-18 Feature description: 1, support for cross-platform operating system Windows XP/Windows 7/Windows 8/Windows 8.1/Windows 10/Windows Server 2003/2008/2012/2016 2, support for Linux operating system; 3, supports Unix operating system; 4, support MAC OS Apple operating system 5, support for MD5, SHA1, SHA256, SHA384, SHA512, CRC32, Alder32 encryption verifi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text &...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    Windows Start Menu Sorter

    Windows Start Menu Sorter

    Sorts a Windows Start Menu into categorized folders.

    ...Written in C# it requires the latest .NET framework (.NET Framework 4.5.2) available from: https://www.microsoft.com/en-au/download/details.aspx?id=42643 and has these System Requirements: http://msdn.microsoft.com/library/8z6watww.aspx SHA256 Hash: 5a2d27f36f9b03872c4555fbdfebcad36463df82d1eef4b6757e5d610201c75c VirusTotal Report: https://www.virustotal.com/en/file/5a2d27f36f9b03872c4555fbdfebcad36463df82d1eef4b6757e5d610201c75c/analysis/1438693492/ To submit a new folder that is not sorting or report a bug please visit: https://sourceforge.net/projects/windowsstartmenusorter/support?...
    Downloads: 1 This Week
    Last Update:
    See Project
  • Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes. Icon
    Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.

    Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.

    Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.
    Learn More
  • 10
    CHash
    CHash is a gui hash tool. *Support MD5 SHA1 SHA256 SHA512 *Provide English and Chinese language
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    SimpleHasher

    SimpleHasher

    Simple Hasher is a Hashing utility for verifying integrity of files.

    Simple Hasher is a Hashing utility for verifying integrity of files using a wide range of supported algorithms: CRC32, ED2K, MD4, MD5, RIPEMD160, SHA1, SHA256, SHA384, SHA512 and WHIRLPOOL512. All processed files are logged and ready for export to a number of different verification file formats Like SFV, MD5SUM, SHA1SUM. Multiple hash types can be generated simultaneously per file. Handy hash and file comparison functions, such as comparing calculated hashes will make this task as simple as A-B-C.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly....
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13
    WinMd5Checksum

    WinMd5Checksum

    Calculating and comparing MD5 checksums, calculating SHA256 hash

    You can calculating md5 hashsums, comparing files and hashsums in pairs. If you have backups of one file and you have a md5 hashsum, you can compare your backups against this md5 hashsum. Calculating SHA256 hashes too. This repository will no longer updated! Please take a look at this url: https://github.com/tualatin/winmd5checksum
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14

    SHA256 Bruter

    Brutforces 4 characters of the SHA256 cryptograhy.

    Brutforces 4 characters of the SHA256 cryptograhy. This bruteforcer can crack any SHA256 hash that is a maximum of 4 chars long. There are 97 recognized characters. The bruteforcer has to go through 97^4 characters (88,529,281)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Darkhash

    Darkhash v1.0 Hash Collision

    A small suite of scripts to crack hash algorithms and more. The following are supported- -->MD4 -->MD5 -->SHA1 -->SHA224 -->SHA256 -->SHA384 -->SHA512 -->RIPEMD160 There will be more algorithm support to come. There is also a utility to create these supported hashes and another utility to encode and deocde strings with Base64. Includes password.lst from John The Ripper.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    Hasher

    A hash ecryption program with many customizations

    This program is focused on making the cracking process of the encrypted data an easy task for the intended receiver of the message. The program lets you create encrypted data out of your text input. It supports many different algorithms, and uses windows 1250 character map, so it supports lots of special characters properly. It was designed to be able to handle long texts if needed, it separates the input to words at spaces. The supported algorithms...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    yeo

    command-line steganography application

    designed to hide messages in jpg and png images without the requirement for any plain-text files. uses aes256 on data, using an sha256 hash of the password as the encryption key. rotates the password by 1 character, and uses an sha256 hash of that for the random seed for the image pointer access. security and invisibility of data is currently being peer-reviewed (since ~2014). At this point it looks like no vulnerabilities have been identified yet. this will evolve further, but remain a console / command application. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    chksm-chkfile

    chksm-chkfile

    Windows MD5/SHA-1/SHA-256 file hashes calculator.

    Calculate MD5, SHA-1, SHA-256 checksum hashes from a specific file, and compare these values with a given string. Accept one filename as parameter. Functionalities : - automatically retrieve text from Windows clipboard and compare it. - 32 & 64 bits windows platforms supported - Installation (Add to file context menu) - Uninstallation Requirements: - Microsfot .NET Framework 2.0 Files: chksm-chkfile.exe MD5: c0b7761deeb7d7dc45aa04726309d4ca SHA1:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    password420

    Strong Password Generator Online - Easy to remember Strong Passwords

    ...Key Features of the Password Management Tool : 1. Generate a strong 20 character password by just remember two pass keys. 2. Password stored in database as a SHA256 bit hash. 3. Two pass keys of varying length makes it difficult to retrieve the password.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Hash Monster
    A versatile gui and console application capable of generating and comparing hashes using a variety of popular hashing libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    CryptX Project v3.56

    A Quick Encryption Program!

    CryptX Is An All In One Text Encoder, Hash Calculator And Checksum Checker! It Combines Ease Of Use With Extraordinary Features! Some Of It's Features Include: Interactive Interface Hashing Function: {HASH ONLY} SHA1 SHA256 SHA384 SHA512 MD5 RIPEMD160 Key Generation: MACTripleDES Key Generation MD4 Hashes: Base64: {Encrypt/Decrypt} With/Without Password Encoding: Binary {Encrypt/Decrypt} Checksum Hashes: SHA1 SHA256 SHA384 SHA512 MD5 RIPEMD160 Checksum Auto-Save Read An Encrypted Text File To Decrypt It Read A Plain Text File To Encrypt It Save The Encrypted/Decrypted Text And Of Course Its All Free! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Advance MD5 Checksum

    Advance MD5 Checksum

    This software allows users to generate the MD5 and SHA Hash Checksum.

    Advance MD5 Checksum Tool is an application designed to allows users to generate the file checksum (MD5/SHA Hash) of any file or string. It can also be useful to check if an executable file is legit, in other words, if it is the official release from the offical author. Hashes supported are: MD5, SHA1, SHA256, SHA384 and SHA512. It is possible to scan all files of a folder with subfolders selectable (Recursive) and create a report with file checksum (MD5/SHA1) of all files with filename and file size. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    I Have The Power

    I Have The Power

    GUI for illustrating the mathematics of large hash algorithms

    A cross platform (Windows\Linux) graphical interface for demonstrating the numerical enormity of large hash algorithms like MD5 (128 bits), SHA1 (160 bits), SHA256 (256 bits) and SHA512 (512 bits). Useful for demonstrations to non-technical audiences such as jury panels, school children, students and so on by converting the scientific notation of the algorithm to "1 in 340 billion....".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    tickets

    pythonic kerberosish ticket system: easy to use, easy to subclass

    A SecureTicket, or Ticket, consists of salt, hash, valid_until, public_flags, flags, data and "invisible" hashed entropy. Tickets are symmetrically signed using SHA256-HMAC. Fields 'valid_until', 'flags' and 'data' may be optionally encrypted using AES128-CBC or TripleAES128-CBC. Values 'data' and 'entropy' may consist of arbitrary objects which are transparently pickled(serialized), optionally gzipped and of course securely signed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Implementation of Rijndael, RSA and El Gamal ciphers as well as SHA256, Blake and Blue midnigh wish hash functions. The program is for encrypting files but it can be rewritten for other purposes.
    Downloads: 0 This Week
    Last Update:
    See Project