Showing 744 open source projects for "hash"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Cloud data warehouse to power your data-driven innovation Icon
    Cloud data warehouse to power your data-driven innovation

    BigQuery is a serverless and cost-effective enterprise data warehouse that works across clouds and scales with your data.

    BigQuery Studio provides a single, unified interface for all data practitioners of various coding skills to simplify analytics workflows from data ingestion and preparation to data exploration and visualization to ML model creation and use. It also allows you to use simple SQL to access Vertex AI foundational models directly inside BigQuery for text processing tasks, such as sentiment analysis, entity extraction, and many more without having to deal with specialized models.
    Try for free
  • 1
    HASH Checksum Tool
    Tool to help you to know the hash value from a specify file. Support some hash values. Version 1.1.0.0 *Se añade soporte para idiomas Ingles y Español* *Permite guardar los resultados en un archivo de .txt* *Permite abrir el bloc de notas para copiar el resultado* Version 1.0.0.1 *Se añade la función de copiar resultados al portapapeles* Version 1.0.0.0 *Se crea el programa*
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Simple MD5 Hash Checker.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Claustrum

    Claustrum

    An unfinished armored chat attempt with complementary tools.

    This is an abandoned project. It got too big for me. I upload it with instructions in case someone is encouraged to continue it, with the condition that it remains free. See wiki for the task list, and also the help dialog into the program. I am not an expert programmer, surely there will be security improvements to make. And, if you need any clarification about the original idea and functions of the program, please let me know.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Open-Hashtool

    Open-Hashtool

    Comfortable hash-tool for texts and files

    Open-Hashtool is an easy2use Qt based application, which can be used to calculate the hash (MD4; MD5; SHA-1; SHA-224; SHA-256; SHA-384; SHA-512; SHA3-224; SHA3-256; SHA3-386; SHA3-512) of texts and files. It's compatible with Windows and Linux. But Linux users need Qt5.1 or Wine (configuration: Windows Version <= Windows 2008) to run the Open-Hashtool. Please read the Wiki for compiling instructions.
    Downloads: 5 This Week
    Last Update:
    See Project
  • G-P - Global EOR Solution Icon
    G-P - Global EOR Solution

    Companies searching for an Employer of Record solution to mitigate risk and manage compliance, taxes, benefits, and payroll anywhere in the world

    With G-P's industry-leading Employer of Record (EOR) and Contractor solutions, you can hire, onboard and manage teams in 180+ countries — quickly and compliantly — without setting up entities.
    Learn More
  • 5
    With this Program you may: - Check signatures of Files, as md2, md5, sha1, sha224, sha256, sha384 sha512 - Comparing Strings To start it in Windows or Linux, you may use the command "java -jar nameOfFile.jar". Or using the .bat - file for Windows, I added as example. For Linux you may try to create a bash file for double clicking. It's recommended to use Java 8.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Felix Hash Tool

    Felix Hash Tool

    File Integrity Check Program

    File Integrity Check Program.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Hash Calculator

    Hash Calculator

    Simple Hash Calculator

    This program will allow you to manually type, or browse for a file on your system. You will then be able to generate a MD5, SHA256, or SHA512 hash digest of this file. This program requires no installation and is intended to be a simple, lightweight program. This is also my first open source project!
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    JChecksum

    JChecksum

    MD5 Checksum Tool

    ...Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files. This tool enables you to verify the file integrity of the downloaded content. I have tried to keep the file size to a minimum. And currently, the file size is 20.7 kB (20,701 bytes). Anyone can inspect the source code and use it to modify, develop and redistribute.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Directory control

    Hot directory

    Control changes in the choosen folder. Choose a log file with the changes within. It's recommended to use Java 8. The directory is not controlled recursively, thus if files are added or deleted in other folders it is not showed. Only things in the folder choosen. Just start a new pararell session to control another folder. Start it with "java -jar file.jar" or with the .bat file as example. You may also start it in the background with "start javaw -jar DirecHashC.jar" .
    Downloads: 0 This Week
    Last Update:
    See Project
  • Say goodbye to broken revenue funnels and poor customer experiences Icon
    Say goodbye to broken revenue funnels and poor customer experiences

    Connect and coordinate your data, signals, tools, and people at every step of the customer journey.

    LeanData is a Demand Management solution that supports all go-to-market strategies such as account-based sales development, geo-based territories, and more. LeanData features a visual, intuitive workflow native to Salesforce that enables users to view their entire lead flow in one interface. LeanData allows users to access the drag-and-drop feature to route their leads. LeanData also features an algorithms match that uses multiple fields in Salesforce.
    Learn More
  • 10

    PeaUtils

    File management utilities: split & join, secure delete, crc/hash

    Suite of file management utilities: split and join files, secure delete, verify checksum and hash values: CRC32. MD5, SHA1, SHA-256, SHA3 and more. Spin-off of PeaZip project.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 11
    Helps you to verify the integrity of the files. Hash Calculator for files. Using: CRC32 MD5 RIPEMD-160 SHA-1 SHA-256 SHA-384 SHA-512 Update: Added CRC32 Now supports big files (more then 4Gb) *Requires .NET 4.5
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12

    nheqminer

    Equihash miner for NiceHash

    nheqminer is the Equihash miner for NiceHash, an advanced crypto currency cloud mining, hash rental service and multipool. Builds are currently available for Windows and in progress for Linux.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    PHP Cron Expression Parser
    .... */12, 2-59/3), intervals (e.g. 0-9), lists (e.g. 1,2,3), W to find the nearest weekday for a given day of the month, L to find the last day of the month, L to find the last given weekday of a month, and hash (#) to find the nth weekday of a given month. You can determine whether or not the promotion should be running, buyers can see when the promotion last ran, determine if the promotion will run on a specific date, and they can plan out their buying strategies based on when the promotion will run next.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    This project provides a file synchronization tool, comparable to unison, with a fast and simple to use application interface written using the Fox toolkit. It can use hash algorithms as well as simple file existence checks for synchronizations.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Quazaa Security Library

    Quazaa Security Library

    A Qt and STL based security library for filesharing clients.

    ...It allows creating and managing security rules and checking content against them. The different currently supported rule types are: ▪ Single IP rules ▪ IP range rules ▪ Country rules (can be disabled at compile time if undesired) ▪ Hash rules ▪ Keyword based rules (match any/all) ▪ Reguler expression content rules ▪ User agent rules
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CryptBench

    CryptBench

    A Benchmark which tests CPU cryptography performance

    ...Cryptopp 4. Lib-Gcrypt 5. Libcpuid Minimum requirements to run benchmark: CryptBench requires a CPU with atleast SSE2 support and 64-bit OS. Following Cipher/Hash Functions are used to generate a final CryptScore for the given CPU: 1. AES-256 2. Blowfish 3. Camellia-256 4. IDEA 5. Chacha20 6. SHA-512 7. SHA3-512(Keccack) 8. MD5 9. Blake2b 10. Whirlpool By default the application uses a buffer size of 256MiB and each test runs for 2 secs(per library test). CryptBench uses Libcpuid for CPU info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    MPMMM

    MPMMM

    Midi Modifier Module

    ...Ideas not yet implemented *plugin or script writer for users to customize midi mods *scalar mute limits all notes to selected scale *selected harmonization you select one of 15 chord voicings and it arpeggios notes or plays together effectively 1 key chords *symmetrics involves two varables list of notes to be played custom scales or partials and the a note to symettrically harmonize around this is a form of songwriters prose I am developing. *bankers mod allows per key patching *selecting of center key for keyflip *harmonized keyflip *tables or hash for quicker midi modifier module
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    rubycollect4j

    Ruby Collections for Java

    The rubycollect4j implements all methods refer to Ruby Array, Hash and Enumerable. For further info, please visit http://ruby-doc.org website. For more documentation, please read JavaDoc. With Java 8: // Sort the characters by its frequency based on the word 'Mississippi' case-insensitively RubyArray<String> word = ra("Mississippi".split("(?!^)")); String result = word.map((c) -> { return c.toLowerCase(); }).sortBy((c) -> { return word.count(c); }).uniq().join(); p(result); // "mpis" With Java 6: // Sort the characters by its frequency based on the word 'Mississippi' case-insensitively final RubyArray<String> word = newRubyArray("Mississippi".split("(?!...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    DuplicateFileCheck

    Duplicate file check / failed .jpg detect, optional unique file copy

    ...The DuplicateFileCheck application was created to simplify this process. You can select to either search the top-level directory or all sub directories (default action). All the files are enumerated with an md5 hash created, after this process each file is checked to determine if it is a duplicate. All unique files can be copied to a chosen output folder if required (default action is not to copy). A duplicates.txt is created which logs all the duplicate files detected. As the files I was trying to recover were mainly .jpg I added a check to make sure the jpg files could be opened without an error. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Hash Forcer

    Simple Brute forcer for hashes

    Simple Brute forcer for "MD2", "MD4", "MD5", "SHA-1", "SHA-256", "SHA-384", "SHA-512", "Base64", "HMACMD5", "HMACSHA1", "HMACSHA256", "HMACSHA384", "HMACSHA512", "HMACRIPEMD160", hashes
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Duplinator

    Duplicate finder and processor. uses SHA256 file hash.

    Identifies duplicate files by computing SHA256 hash of file contents. provides options to either hardlink, delete, or create shortcuts to duplicated files. Hardlink is the recommended option for most complicated file copy problems (like old file systems with lots of stuff on used by lots of people), as both copies remain identical, and disk space is minimised.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Queimo
    ...Desta forma é máis facil enviar por email ou envialo para armazenar no google drive ou outro produto do estilo. Gerar a firmar de um arquivo para comprovar se alguem modificou alguma informaçäo com código HASH com o calculo MD5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    LinAsm

    LinAsm

    Collection of fast and optimized assembly libraries for x86-64 Linux

    ...It implements many common and widely used algorithms for array manipulations: searching, sorting, arithmetic and vector operations, unit conversions; fast mathematical and statistic functions; numbers and time converting algorithms; finite impulse response (FIR) digital filters; spectrum analysis algorithms, Fast Hartley transformation; CPU cache friendly functions and extremely fast abstract data types (ADT) such as hash tables b-trees, and much more. LinAsm libraries are written on FASM assembly language. They are stable and have appropriate benchmarks for many units. All libraries are well documented and grouped by their functionality. To get more information about this library, please visit the official web site: http://linasm.sourceforge.net
    Downloads: 16 This Week
    Last Update:
    See Project
  • 24

    CyberCrypt

    .NET Library for Encryption/Decryption

    ..._AES256.EncryptFile("C:\example.txt", "YourPassword") Decrypting file using AES (256 bits): CyberCrypt._AES256.DecryptFile("C:\example.txt", "YourPassword") Hashing string using SHA512: CyberCrypt._SHA.SHA512Hash("A string that will be converted to SHA512 hash.")
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Hash

    Hash

    Hash: File Checksum Generator

    Hash is fast and simple java utility program for calculating and verifying checksums for files and text. Hash can generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 checksum values.
    Downloads: 0 This Week
    Last Update:
    See Project