Showing 744 open source projects for "hash"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Automated RMM Tools | RMM Software Icon
    Automated RMM Tools | RMM Software

    Proactively monitor, manage, and support client networks with ConnectWise Automate

    Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
    Learn More
  • 1
    sqlmap

    sqlmap

    Automatic SQL injection and database takeover tool

    sqlmap is a powerful, feature-filled, open source penetration testing tool. It makes detecting and exploiting SQL injection flaws and taking over the database servers an automated process. sqlmap comes with a great range of features that along with its powerful detection engine make it the ultimate penetration tester. It offers full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, and many other database management systems. It also...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Miller

    Miller

    Miller is like awk, sed, cut, join, and sort for name-indexed data

    ...Miller operates on key-value-pair data while the familiar Unix tools operate on integer-indexed fields: if the natural data structure for the latter is the array, then Miller's natural data structure is the insertion-ordered hash map. Miller handles a variety of data formats, including but not limited to the familiar CSV, TSV, and JSON/JSON Lines. (Miller can handle positionally-indexed data too!)
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Node Redis

    Node Redis

    A high performance Node.js Redis client

    ...Minimal parsing is done on the replies. Commands that return a integer return JavaScript Numbers, arrays return JavaScript Array. HGETALL returns an Object keyed by the hash keys. All strings will either be returned as string or as buffer depending on your setting.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Kong

    Kong

    The Cloud-Native API Gateway

    Kong is a next generation cloud-native API platform for multi-cloud and hybrid organizations. When building for the web, mobile, or Internet of Things, you’ll need a common functionality to run your software, and Kong is that solution. Kong acts as a gateway, connecting microservices requests and APIs natively while also providing load balancing, logging, monitoring, authentication, rate-limiting, and so much more through plugins. Kong is highly extensible as well as platform agnostic,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Say goodbye to broken revenue funnels and poor customer experiences Icon
    Say goodbye to broken revenue funnels and poor customer experiences

    Connect and coordinate your data, signals, tools, and people at every step of the customer journey.

    LeanData is a Demand Management solution that supports all go-to-market strategies such as account-based sales development, geo-based territories, and more. LeanData features a visual, intuitive workflow native to Salesforce that enables users to view their entire lead flow in one interface. LeanData allows users to access the drag-and-drop feature to route their leads. LeanData also features an algorithms match that uses multiple fields in Salesforce.
    Learn More
  • 5
    fHash

    fHash

    A files hash calculator for Windows and macOS.

    An open source files hash calculator for Windows and macOS. * MD5, SHA1, SHA256 and SHA512. * Drag & drop. * Integrated with context menu in Explorer/Finder. * Support Windows 7 and later. * Support macOS 13 and later, with universal binary. * Support Dark Mode. * English and Simplified Chinese UI. The icon "希" is from hash in Chinese "哈希".
    Leader badge
    Downloads: 15 This Week
    Last Update:
    See Project
  • 6
    Stake Crash Predictor

    Stake Crash Predictor

    Stake Crash Predictor is a toolkit for stake mines predictor & Plinko.

    The Stake Crash Predictor is a focused toolkit that combines statistical analysis, optional server fairness seed hash decrypt helpers, and AI-assisted summaries to help you study rounds on Stake.us. This project centers on the stake mines predictor and stake predictor workflows Demo-focused stake crash predictor app — seed-inspection helpers (SHA-512 / SHA-256), AI-assisted summaries, and demo bot templates for stake mines predictor too, Start in demo mode to test safely. ...
    Leader badge
    Downloads: 129 This Week
    Last Update:
    See Project
  • 7
    f2568

    f2568

    f2568() - A variable Length Tabulation Hash Function

    ...The main purpose of this function is to provide a sound alternative to other hash functions with a 64 bit result and especially to obtain a strong hash to consult the CHRing consistent hash ring for load balancing purposes (with a connection tuple as the input). f2568resume() allows to resume computation with additional data which is non consecutively located at another place. Also, it allows to chain multiple f2568resume() calls to obtain a strong 64 bit hash of any larger data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    FEHASHMAC is the largest collection of publicly known hash algorithms integrated into a command-line utility. FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC and KMAC support are included, plus SHA3 extensions kmac128, kmac256, kmacxof128, kmacxof256 for message.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    EDGE Toolkit

    EDGE Toolkit

    Cross-platform Integrated Security Suite written in Go

    Multi-purpose cross-platform hybrid cryptography tool for symmetric and asymmetric encryption, cipher-based message authentication code (CMAC/PMAC/GMAC/VMAC), recursive hash digest, hash-based message authentication code (HMAC), HMAC-based key derivation function (HKDF), password-based key derivation function (PBKDF2/Argon2/Scrypt), password-hashing scheme (Bcrypt/Argon2/Makwa), shared key agreement (ECDH/VKO/X25519), digital signature (RSA/ECDSA/EdDSA/GOST/SPHINCS+), X.509 CSRs, CRLs and Certificates, and TCP instant server with TLS 1.3 and TLCP encryption layers for small or embedded systems.
    Downloads: 10 This Week
    Last Update:
    See Project
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • 10

    hash_val_4_Bloom

    search for hash values used in Bloom filter for QNR membership

    FenderBender -- on MersenneForum.org "Determine Squares" -- came up with using Bloom filter to detect Quadratic non-residues modulo small primes in order to reject what inputs are certainly not square roots. This reduces, by > 99%, the amount of actual square root calc's done and therefore is more efficient and faster. Search fur 32-bit vs 64-bit, hash values that make "perfect" Bloom filter. Variety of (simple) hash functions, requiring 2, 3, 4 or 5 hash values. Hideously vast search space. Non-differentiable, so no gradient descent algo's.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BypassHash

    BypassHash

    This tool downloads an executable and bypasses hash-based virus checks

    This tool downloads an executable, ELF (Linux) and PE (Windows), modify metadata to bypasses hash-based virus checks and protect against identification with metadata (like rich headers, timestamps, ...).
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    KeePass

    KeePass

    A lightweight and easy-to-use password manager

    KeePass Password Safe is a free, open source, lightweight, and easy-to-use password manager for Windows, Linux and Mac OS X, with ports for Android, iPhone/iPad and other mobile devices. With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to...
    Leader badge
    Downloads: 151,465 This Week
    Last Update:
    See Project
  • 13
    Aviator Predictor

    Aviator Predictor

    Aviator hack: seed-inspection of aviator crash predictor & aviator app

    Our downloadable SHA256 analysis tool powers the Aviator predictor, Aviator predictor app, and aviator crash predictor. Available for desktop, it’s designed for research, fairness verification, and safe demo testing Demo-focused aviator predictor tools — seed-inspection helpers (SHA-512 / SHA-256), AI-assisted summaries, and demo bot templates for aviator crash predictor, Start in demo mode to test safely. Disclaimer: Provided for analytical and testing purposes only. No predictive...
    Leader badge
    Downloads: 1,401 This Week
    Last Update:
    See Project
  • 14
    HashGuard Virus Scanner

    HashGuard Virus Scanner

    HashGuard – CLI based Virus Scanner

    HashGuard is a lightweight, drag-and-drop CLI virus scanner that uses VirusTotal to check files for malware. It hashes any file using SHA-256, queries VirusTotal, and gives a color-coded risk rating.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 15
    EasyHash

    EasyHash

    HASH value generator

    EasyHash is a HASH value generator that is very easy to use and at the same time very efficient. Furthermore, the execution speed of the processes is very fast. The user interface is nice, very intuitive and offers multiple methods for importing files. In addition to this, it allows for rapid text entry, making it incredibly easy to use and adaptable to any circumstance of use.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Cmph is a free minimal perfect hash C library, providing several algorithms in the literature in a consistent, ease to use, API.
    Leader badge
    Downloads: 247 This Week
    Last Update:
    See Project
  • 17
    NanaZip

    NanaZip

    The 7-Zip derivative intended for the modern Windows experience

    NanaZip is an open source file archiver intended for the modern Windows experience, forked from the source code of well-known open source file archiver 7-Zip.
    Leader badge
    Downloads: 880 This Week
    Last Update:
    See Project
  • 18
    PeaZip

    PeaZip

    Free Zip software and Rar extractor

    PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX. Create: 7Z, ARC, Brotl, BZip, GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP, Zstandard files and more Open and extract 200+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives...
    Leader badge
    Downloads: 1,496 This Week
    Last Update:
    See Project
  • 19
    Simple-Image-Duplicate-Cleaner

    Simple-Image-Duplicate-Cleaner

    Windows GUI application tool for image similarity checking

    This is a Windows GUI application tool for image similarity checking. No installation is required, just run it. It searches for HEIC, PNG, BMP, JPEG image formats in the specified directory and uses hash to compare similarities. It is still a bate version.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    OhMyHash adalah program Bash sederhana yang dirancang untuk menghitung nilai Hash dari sebuah file menggunakan beberapa algoritma hashing, seperti MD5, SHA-1, SHA-256, dan SHA-512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Activation Key .NET Class Library

    Activation Key .NET Class Library

    Represents the activation key used to protect your C# application.

    A specific software-based key for a computer program C# source code. It certifies that the copy of the program is original. It is also called a license key, product key, product activation, software key and even a serial number. The key can be stored as a human readable text for easy transfering to the end user. Contains methods for generating the cryptography key based on the specified hardware and software binding. An additional feature is the ability to embed any information directly...
    Downloads: 140 This Week
    Last Update:
    See Project
  • 22
    Leader badge
    Downloads: 296 This Week
    Last Update:
    See Project
  • 23
    DC++

    DC++

    A Windows client for the Direct Connect networks

    DC++ is an open source Windows client for the Direct Connect file sharing network. The DC network is a decentralized network, made up of individual servers (hubs) that users join to share files with other members on that hub. Each hub is individually run by a fellow user of the DC network, and may have certain themes to the content on the hub. Hub owners set up rules to regulate their hub as they see fit.
    Leader badge
    Downloads: 1,211 This Week
    Last Update:
    See Project
  • 24
    Password Keeper + Generator

    Password Keeper + Generator

    Free portable cross-platform graphical multi-user password manager

    Free portable cross-platform multi-user password manager, 100%-pure Java. DB for each pkg-user is encrypted and protected by pkg-user hash. In addition - passwords in DB are stored in encrypted form. In result - stored passwords are double encrypted ! Passwords of pkg-users are not stored in program - stored and compared only hashes. Support md2, md5, sha1, sha256, sha384 and sha512 hash. Support export DB to CSV, HTML, XLS or XML and import from CSV, XLS or XML. Simple and intuitive GUI - Graphical User Interface. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    cracking-actions

    cracking-actions

    a bruteforcer that can crack variety of files such as zip,rar & more

    cracking-actions is an open source software that allows you to crack passwords, files, etc... ,it targets windows and linux
    Downloads: 4 This Week
    Last Update:
    See Project