CyoHash is a simple shell extension that is used from within Windows Explorer to calculate the MD5 hash, SHA1 hash, or CRC32 checksum of a file. (Additional SHA256, SHA384, and SHA512 algorithms are available for users of Windows XP SP3 or newer.)

Features

  • MD5
  • SHA1
  • SHA256
  • SHA384
  • SHA512
  • CRC32
  • Windows
  • Shell extension

Project Samples

Project Activity

See All Activity >

Categories

Security

License

BSD License

Follow CyoHash

CyoHash Web Site

Other Useful Business Software
Create and run cloud-based virtual machines. Icon
Create and run cloud-based virtual machines.

Secure and customizable compute service that lets you create and run virtual machines on Google’s infrastructure.

Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
4
2
0
0
1
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 5 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 5 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5

User Reviews

  • Thank you very much for the program!
  • 80% for first impression. Calculation is fine, call from Windows Explorer context also. The only flaw seems to be the rigidity of the output window a.k.a. inability to resize the column containing the hash result. Some hashes are too long to fit. Apart from column resize, a line-wrapping would also resolve this. As it is one has to Copy Hash/Export Hash and do the comparison with the source's hash in another environment. P.S. That said, I realize that the probability to find a pair of 'legitimate' and 'tampered with' files, for whom 45 first hex-digits of 64-digit hash would be the same, is minimal.
  • The application is helpful, thank you.
  • Very useful, easy to use
    1 user found this review helpful.
  • Works perfectly. You don't even need a readme.txt. I just downloaded it at 2:36PM and it's just now 2:39 and I managed to use download, install, find and use CyoHash to check the MD5sum of a Linux Mint distro, register on Sourceforge and come back to write this review! One of the fastest executables I have downloaded in a while.
    1 user found this review helpful.
Read more reviews >

Additional Project Details

Operating Systems

Windows

Intended Audience

End Users/Desktop

User Interface

Win32 (MS Windows)

Programming Language

C++

Related Categories

C++ Security Software

Registered

2009-08-17