Showing 31 open source projects for "binary hash"

View related business solutions
  • Network Management Software and Tools for Businesses and Organizations | Auvik Networks Icon
    Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
  • Web Hosting, Reseller Hosting and Cloud Server Hosting | ScalaHosting Icon
    Web Hosting, Reseller Hosting and Cloud Server Hosting | ScalaHosting

    Help your website thrive by hosting it on the cloud which delivers scalability, high speed and security 24/7/365.

    From freelance web developers, to web design agencies, to bustling e-commerce websites, to savvy domain resellers, clients trust our managed cloud-hosting solutions to reach their full potential on the web.
  • 1
    Fast Binary Encoding (FBE)

    Fast Binary Encoding (FBE)

    Fast Binary Encoding is fast and universal serialization solution

    Fast Binary Encoding is ultra fast and universal serialization solution for C++, C#, Go, Java, JavaScript, Kotlin, Python, Ruby, and Swift. Fast Binary Encoding allows to description of any domain models, business objects, complex data structures, client/server requests & responses and generate native code for different programming languages and platforms.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Hyprspace

    Hyprspace

    A Lightweight VPN Built on top of IPFS + Libp2p

    A Lightweight VPN Built on top of IPFS & Libp2p. Libp2p is a networking library created by Protocol Labs that allows nodes to discover each other using a Distributed Hash Table. Paired with NAT hole punching this allows Hyprspace to create a direct encrypted tunnel between two nodes even if they're both behind firewalls. Moreover! Each node doesn't even need to know the other's ip address prior to starting up the connection. This makes Hyprspace perfect for devices that frequently migrate...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    Modsurfer

    Modsurfer

    Modsurfer provides ops & dev teams with a system of record

    Modsurfer provides ops & dev teams with the first system-of-record and diagnostics application to search, browse, validate, audit, and investigate WebAssembly binaries. At-a-glance insights into WebAssembly module data (code size & complexity, imports/exports & more). Search for details about modules (hash, ID, function names, strings, namespaces, errors & more). Easily audit and track all the WebAssembly code in your stack. Debug & triage issues otherwise difficult to pinpoint in opaque...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    roaring

    roaring

    Roaring bitmaps in Go (golang)

    This library is used in production in several systems, it is part of the Awesome Go collection. There are also Java and C/C++ versions. The Java, C, C++ and Go version are binary compatible: e.g, you can save bitmaps from a Java program and load them back in Go, and vice versa. We have a format specification. Sets are a fundamental abstraction in software. They can be implemented in various ways, as hash sets, as trees, and so forth. In databases and search engines, sets are often an integral...
    Downloads: 0 This Week
    Last Update:
    See Project
  • deskbird is the most intuitive desk booking app for your hybrid office. Icon
    deskbird is the most intuitive desk booking app for your hybrid office.

    With deskbird, creating an efficient workplace has never been easier.

    For companies in need of a people-centric workplace management solution so employees can see who is in the office, schedule their office and work-from-home days, and book resources for office days.
  • 5
    Hivemind

    Hivemind

    Decentralized deep learning in PyTorch. Built to train models

    Hivemind is a PyTorch library for decentralized deep learning across the Internet. Its intended usage is training one large model on hundreds of computers from different universities, companies, and volunteers. Distributed training without a master node: Distributed Hash Table allows connecting computers in a decentralized network. Fault-tolerant backpropagation: forward and backward passes succeed even if some nodes are unresponsive or take too long to respond. Decentralized parameter...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    spaCy

    spaCy

    Industrial-strength Natural Language Processing (NLP)

    spaCy is a library built on the very latest research for advanced Natural Language Processing (NLP) in Python and Cython. Since its inception it was designed to be used for real world applications-- for building real products and gathering real insights. It comes with pretrained statistical models and word vectors, convolutional neural network models, easy deep learning integration and so much more. spaCy is the fastest syntactic parser in the world according to independent benchmarks, with...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located...
    Leader badge
    Downloads: 152 This Week
    Last Update:
    See Project
  • 8
    fHash

    fHash

    A files hash calculator for Windows and macOS.

    An open source files hash calculator for Windows and macOS. * MD5, SHA1, SHA256 and SHA512. * Drag & drop. * Integrated with context menu in Explorer/Finder. * Support Windows 7 and later. * Support macOS 11 and later, with universal binary. * Support Dark Mode. * English and Simplified Chinese UI. The icon "希" is from hash in Chinese "哈希".
    Leader badge
    Downloads: 27 This Week
    Last Update:
    See Project
  • 9
    Sobbu

    Sobbu

    Encode-Decode Tool weaponized with Hash Encrypt & Hash Cracker

    Sobbu is a cryprography tool with various encode-decode algorithm weaponized with Hash encrypting and Hash cracker via Rainbow Table method. This tool used 4 different hash database to identify hash value. Currently available for Windows (CLI + GUI) and Linux (CLI) Latest version : 1.4 Available Encode-Decode algorithm : - Base32 - Base64 - Binary - Octal - Hex - ASCII - URL - HTML - ROT13 Available Hash encrypting and Hash cracking algorithm : - MD5 - SHA1 - SHA224...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Compliance Operations Platform. Built to Scale. Icon
    Compliance Operations Platform. Built to Scale.

    Gain the visibility, efficiency, and consistency you and your team need to stay on top of all your security assurance and compliance work.

    Hyperproof makes building out and managing your information security frameworks easy by automating repetitive compliance operation tasks so your team can focus on the bigger things. The Hyperproof solution also offers powerful collaboration features that make it easy for your team to coordinate efforts, collect evidence, and work directly with auditors in a single interface. Gone are the days of uncertainty around audit preparation and compliance management process. With Hyperproof you get a holistic view of your compliance programs with progress tracking, program health monitoring, and risk management.
  • 10
    StructPie

    StructPie

    A set of C libraries to implement data structures and algorithms

    Struct-Pie (Structures Pie) is a set of C shared libraries to implement data structures and algorithms so that they can be used/integrated easily into C projects. LIFO & FIFO Stack, Binary Search Tree, Priority Queue and a Hash Table are implemented and included in this package. Future releases will have many other data structures. The hash table in this package uses separate chaining to avoid collision. In the "hash_table" directory, the hash table implementation uses linked lists...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    xxhsum for Windows

    xxhsum for Windows

    xxhsum 0.8.0 - print or check xxHash non-cryptographic checksums

    xxhsum 0.8.0 by Yann Collet Print or check xxHash (32, 64 or 128 bits) checksums. When FILE is -, read standard input. xxhsum supports a command line syntax similar but not identical to md5sum(1). Differences are: xxhsum doesn´t have text/binary mode switch (-b, -t); xxhsum always treats files as binary files; xxhsum has a hash bit width switch (-H); As xxHash is a fast non-cryptographic checksum algorithm, xxhsum should not be used for security related purposes.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Universal Encoder Decoder - AyaN Softwar

    Universal Encoder Decoder - AyaN Softwar

    84 Type Encoding/Decoding Options And Full Offline - AyaN Software

    ... to use, just one click and it will start. There is no difficulties of installing process and system agreement. With the use of this software you can encode and decode a lots of variations. for example, you can encode and decode 64 BASE data, URL, HTML, JavaScript, ROT 13, you can convert text to binary, and vice versa, hex to ASCII, decimal to binary, hex, octal, and you can also generate MD4, MD5, SHA1 and SHA245 hashe etc.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13

    sls

    SLS Team Java Library

    ... dependencies between classes, so u can easily cut off unnecessary code and simply include what u need in your project. Feel free and simple without headache. We are using class Binary as best for us to work with byte arrays. Simple classes for console-like colored apps in GUI-mode. Look also http://demo.sls.team
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    ALEPH-w

    ALEPH-w

    Data structures and Algorithms library

    Aleph-w is a library of data structures and algorithms implemented in and for C++. It contains the main data structures: single and double lists, special arrays (dynamic and of bits), many types of trees: multitrees, binary search trees, avl, red-black, randomized, treaps, splay and other interesting types. Several types of hash tables are implemented: separated chaining, open adressing with linear probing and double function hash; this last one has a garbage colector mechanism...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    file digest

    A command-line utility for calculating and verifying file checksums.

    ... the checksums: digest -c skein512/256 checksums.skein You can get a full list of supported algorithms and test the performance of different algorithms on your PC using the command: digest test <iterations> <filename> This will calculate hash sum of <filename> multiple times (number of times is specified by <iterations>) and output the results with precise timings. Note: if you have a 64-bit operating system, use 64-bit binary of the utility, because it is significantly faster for large files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    #3SAT Solver: Model Listing

    Counts Satisfiable Solutions

    #3SAT finds all satisfiable solutions to a 3CNF Formula. This particular solver can count or return all solutions or a hash of them in binary or Ascii format.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Quazaa Security Library

    Quazaa Security Library

    A Qt and STL based security library for filesharing clients.

    The Quazaa Security Library implements a security manager for filesharing clients. It allows creating and managing security rules and checking content against them. The different currently supported rule types are: ▪ Single IP rules ▪ IP range rules ▪ Country rules (can be disabled at compile time if undesired) ▪ Hash rules ▪ Keyword based rules (match any/all) ▪ Reguler expression content rules ▪ User agent rules
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    QDAC3.0

    QDAC3.0

    QDAC 3.0 is a VCL & FMX data access component

    ...: QDAC provide powerful memory dataset and can be load or save data to files , databases. Support follow formats load and save: * CSV/TXT * MDS(Binary format) * MDZ(Compressed binary format) * XML(ADO compatible) Support follow db in version 1.0: * PostgreSQL * SQLite(public or encrypt) More information please see the document. Url for 2.0:http://sourceforge.net/p/qdac 项目QQ群:250530692 项目主页:http://blog.qdac.cc
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    ... ----- Text to Number ----- Binary Hexadecimal ----- Text Encoding ----- Base 64 HTML Entities ----- Text Hashing ----- AES MD5 SHA1 (160 bit) SHA256 SHA384 SHA512 Word Cipher is a free-distributed software.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20

    Code Paint

    A Software for determing codes for hex and all the properties of color

    A Software for determing codes for hex and all the properties of color. This software uses vb 13 as a base language and .Net Framework 4.5.This software is stable but recommendation and issues are always welcome
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    libhash

    libhash

    Thread safe hash library

    A hash table library that can store binary data. It is thread safe and you can use as many hash tables in your program as you wish because each has its own context. You can drop items from the hash table and can expire items that have become too old. String keys are default, but with your own comparison routine you can use binary or specialty keys. If you have special needs you can substitute your on hash calculation function for the built in one. There is also a library call that allows you...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A portable in-place bitwise binary Fredkin trie algorithm which allows for near constant time insertions, deletions, finds, closest fit finds and iteration. Is approx. 50-100% faster than red-black trees and up to 20% faster than O(1) hash tables.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    CryptX Project v3.56

    A Quick Encryption Program!

    CryptX Is An All In One Text Encoder, Hash Calculator And Checksum Checker! It Combines Ease Of Use With Extraordinary Features! Some Of It's Features Include: Interactive Interface Hashing Function: {HASH ONLY} SHA1 SHA256 SHA384 SHA512 MD5 RIPEMD160 Key Generation: MACTripleDES Key Generation MD4 Hashes: Base64: {Encrypt/Decrypt} With/Without Password Encoding: Binary {Encrypt/Decrypt} Checksum...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    aztree library is an implementation of most types of tree data-structure in C language. The library will implement these different type of trees. Binary, Self-balancing binary search, B-trees, Tries, BSP, Non-binary and few used in Computer Graphics
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Command line torrent viewer and hash checker. Displays metadata and file catalog from a .torrent file. Offline verifies content hashes of downloaded files against torrent. Linux or Windows, Windows binary included.
    Leader badge
    Downloads: 31 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next