Showing 744 open source projects for "hash"

View related business solutions
  • Free and Open Source HR Software Icon
    Free and Open Source HR Software

    OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.

    Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
    Learn More
  • Introducing The All-in-One Healthcare Compliance Software Icon
    Introducing The All-in-One Healthcare Compliance Software

    The Complete Paperless Solution for Compliance

    MedTrainer is for healthcare organizations of any size to guarantee compliance insurance and risk mitigation. Doctors, Administrators, and Nurses from large cities to rural areas use MedTrainer healthcare compliance platform for their team to work cohesively and efficiently within the workplace. Everything is under one roof with MedTrainer's all-in-one system for learning, compliance, credentialing, and accreditation.
    Learn More
  • 1
    iTelliHashExcel

    iTelliHashExcel

    Cryptographic Hashing Application for Excel Files

    iTelliHashExcel is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Ardb

    Ardb

    A redis protocol compatible nosql, it support multiple storage engines

    ...Ardb commands VS Redis Commands. Multi storage engines supported. RocksDB, LevelDB, LMDB, WiredTiger, PerconaFT, ForestDB. Multi data structure types supported, String, List, Set, Sorted Set, Hash, Bitmap(String), HyperLogLog(String), 2D Spatial Index(Sorted Set), Stream. Replication compatible with Redis 2.6/2.8. Ardb instance work as slave of Redis 2.6/2.8+ instance. Arab instance work as master of Redis 2.6/2.8+ instance. Ardb instance work as slave of Ardb instance. Auto failover support by redis-sentinel. Lua Scripting support. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    SimpleHNC

    Very Simple Hash value calculater and Checksum Tool

    You can use this program to calculate your file Hash value, also you can use this to verify the file you had downloaded.
    Downloads: 0 This Week
    Last Update:
    See Project
  • One platform for phenomenal in-person and virtual care Icon
    One platform for phenomenal in-person and virtual care

    For Primary Care Clinicians

    Elation Telehealth’s HIPAA-compliant video platform within our EHR, powered by Zoom, ensures your practice can provide virtual care without having to implement or maintain a separate solution.
    Learn More
  • 5
    __Alien Cipher

    __Alien Cipher

    A bespoke symmetric cipher.

    ...The primary aim is to simply learn the fundamentals and finer details of cryptography in general and build working examples of my ideas in code. The code is shared here for posterity (future folk) in the guise that it may help others also on the path to cryptography. This code demo uses a 256bit rolling hash table (8x8bytes) at its heart to mix together pre-defined parameters in a way that allows the cipher to produce encoded output that is locked to a key of arbitrary length without padding. Based upon some random data points the cipher produces encoded output that is non-deterministic in nature, the same key and message will never produce the same output each time it's run. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    v1pad

    One-time-pad encryption using a virtual pad

    v1pad is a command-line tool that encrypts and decrypts files using one-time-pad encryption. v1pad uses a virtual pad, meaning that the one-time pad is generated dynamically based on user input instead of being stored in a file. The name v1pad is an abbreviation for Virtual One-Time Pad.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    ALEPH-w

    ALEPH-w

    Data structures and Algorithms library

    ...It contains the main data structures: single and double lists, special arrays (dynamic and of bits), many types of trees: multitrees, binary search trees, avl, red-black, randomized, treaps, splay and other interesting types. Several types of hash tables are implemented: separated chaining, open adressing with linear probing and double function hash; this last one has a garbage colector mechanism that allows to free deleted entries. Dynamic linear hash tables are implemented too. The main algorithms on graphs are implemented in an easy way and with good performance features. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Cube26

    General Purpose A-Z Stream Cipher (C++ implementation)

    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Cube256

    General Purpose Stream Cipher and Crypto System

    Downloads: 0 This Week
    Last Update:
    See Project
  • Subcontractor Construction Management Software Icon
    Subcontractor Construction Management Software

    Bidtracer has been built specifically for the MEP/BAC industry for both construction and service side

    Bidtracer has been built specifically for the MEP/BAC industry for both construction and service side including but not limited to CRM, Bid Management, Invitation to Bid, BAC Estimating, BAC Engineering, Project Management, Service Agreement, Service Work Orders, Service Repair, Service Projects all built natively in the cloud. Estimating/Engineering are connected with live pricing to many manufacturers such as JCI, Distech Controls, ABB, Carrier, ALC and many peripheral distributors such as Kele, Alps, Belimo, Siral, Bray. If we don’t have it already, we will import it as many times throughout the year. Whether you're 2 users or 1000s our system works for all levels of business and all types of users: estimators, engineers, PMs, sales, executive, and field workers with built in rich reporting, customizable reporting, charts and graphs to help companies analyze their data in real time.
    Learn More
  • 10

    KeyMate

    KeyMate is a simple password manager with basic encryption.

    ...It is lightweight, simple, and provides easy access to all your passwords while protecting them with a master password. The master password is not stored in the files, and a value calculated from its hash is used as an encryption key for the password data file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Simple XML Parse

    This is a simple and fast XML parser based on a recursive function.

    This XML Parser does not do much validation but is fast and simple. Currently, I think, it handles everything including CDATA. There are two styles, both resulting in a Perl hash.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    File Split and Join FREE.PRO

    File Split and Join FREE.PRO

    File splitter and joiner (FREE.PRO)

    Бесплатная программа для нарезки файлов. Перед разделением файла можно посмотреть в текстовом (или в HEX) формате точку разреза (очень удобно, если нужно разделить очень большой файл перед/после искомой строки). Существует возможность найти в файле строковое представление байтов (например, в текстовом файле). Текстовое представление файла может быть отображено в любой на выбор кодировке.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Hash Launcher

    Light Weight Android App Launcher With an Integrated Browser

    Light Weight Android App Launcher With an Integrated Browser Features are as follows:: #Smooth and Sleak. #Low Memory Footprint. #Wallpapers Section. #Costumizable. #Google Search Bar. #Transparency Managing. #Integrated Browser. #Integrated Downloader. #Play/Stream Audio/Video Online.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Write a hash table in C

    Write a hash table in C

    Learn how to write a hash table in C

    Hash tables are one of the most useful data structures. Their quick and scalable insert, search and delete make them relevant to a large number of computer science problems. Understanding of how a fundamental data structure works under the hood. Deeper knowledge of when to use hash tables, when not to use them, and how they can fail. Exposure to new C code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    PeaZIP-mod

    It's a fork of Free Zip software and Rar extractor by Giorgio Tani.

    PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX. Create: 7Z, ARC, BZip/GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP files and more Open and extract 180+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives (sfx), split files,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify the checksums: digest -c skein512/256 checksums.skein You can get a full list of supported algorithms and test the performance of different algorithms on your PC using the command: digest test <iterations> <filename> This will calculate hash sum of <filename> multiple times (number of times is specified by <iterations>) and output the results with precise timings. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    PokemonGo-Bot

    PokemonGo-Bot

    The Pokemon Go Bot, baking with community

    PokemonGo-Bot is a project created by the PokemonGoF team. Since no public API available for now, a patch to use HASH-Server was applied. PokemonGoF is not part of HASH-Server dev team and has no connection with it. Based on Python for botting on any operating system - Windows, macOS and Linux. Multi-bot supported. Able to edit bot if certain level has reached. Allow custom hash service provider, if any. GPS Location configuration. Search & spin Pokestops / Gyms. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 19
    casync

    casync

    Content-addressable data synchronization tool

    ...Let's take a large linear data stream, split it into variable-sized chunks (the size of each being a function of the chunk's contents), and store these chunks in individual, compressed files in some directory, each file named after a strong hash value of its contents, so that the hash value may be used to as key for retrieving the full chunk data. Let's call this directory a "chunk store". At the same time, generate a "chunk index" file that lists these chunk hash values plus their respective chunk sizes in a simple linear array. The chunking algorithm is supposed to create variable, but similarly sized chunks from the data stream.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    With this tool you are able to test different hashes: - MD2 - MD5 - SHA1 - SHA224 - SHA256 - SHA384 - SHA512 Recommended Java 8 For any questions you may use the ticketing system .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    IMAGE FOR EXT4 FILE SYSTEM FORENSICS 1) Download the files required for the project 2) Extract the raw image from 'image1.tar.xz' using the following command # tar -xf image1.tar.xz 3) Download 'hash.txt' to the same folder as the raw image 4) Verify if the hash of the downloaded image matches that in 'hash.txt', using # md5sum image1.dd > check_hash.txt # md5sum -c check_hash.txt hash.txt
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22

    好书阅读器 VReader

    可竖排(直排)阅读中文的电子书软件

    竖排(直排)阅读纯文本电子书阅读器。支持简本中文,与繁体(正体)中文的纯文本文件。可增减内嵌字体。分别改变正文内容与标题内容的字体,字号,与颜色。可修改背景色。横版与直版自由切换。可设置字距,行距,页边距,与是否显示分行线等功能。安装包内附加了目前最好的全字库楷体字体与隶书字体。用Hash文件目录的方式,可记忆每本书的阅读位置又不会泄露用户的浏览历史。 既可全屏显示,又能Esc一键最小化到系统托盘区。 这是介面简单,而又功能强大的文本电子书阅读器。 力图做到有阅读“古籍善本”的感觉。 最新版本增加了HTML5导出功能,可在任何系统上的浏览器上使用。
    Downloads: 3 This Week
    Last Update:
    See Project
  • 23
    Voldemort

    Voldemort

    A distributed key-value storage system

    ...It offers many other features such as pluggable serialization support, data item versioning and an SSD Optimized Read Write storage engine. Voldemort is not a relational database or an object database. It is essentially a big, distributed, persistent, fault-tolerant hash table. This doesn’t make it ideal for all applications but does offer unique advantages, such as the ability to read and write scale horizontally, and the ability to combine in memory caching with the storage system so that a separate caching tier is not required.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Filecalibur

    Filecalibur

    A file manager to sort huge collections of files.

    Filecalibur calculates hashes of the analyzed files (using hashdeep) and stores them in text files. Using this hash files, differences or modifications of files within this collections are identified and used to modify other collections. It uses rsync to synchronize filecollections with each other. In the end Filecalibur does nothing what you would not be able to do by hand - but here you can keep track of several tousand files. If you do backups, Filcalibur ensures you that your backups are really identical.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    SHAFT — Simple Hash Functions Test

    Collision tests for third-party hash functions implementations.

    This project conducts collision tests on many hash functions, trying to find options for those interested in leaving SHA-1 (which is kind of imperative these days). Tests are conducted on a per-environment basis, so that each environment will produce some specific results. Also, user can choose criterion such as: * attempts per second; * collision attempts per max attempts supported; and * power consumption.
    Downloads: 0 This Week
    Last Update:
    See Project