Search Results for "secure hash algorithm" - Page 3

Showing 182 open source projects for "secure hash algorithm"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 1
    Blessing Skin Server

    Blessing Skin Server

    Web application brings custom skins back in offline Minecraft servers

    Puzzled by losing your custom skins in Minecraft servers running in offline mode? Now you can easily get them back with the help of Blessing Skin. Blessing Skin is a web application where you can upload, manage and share your custom skins & capes! Unlike modifying a resource pack, everyone in the game will see the different skins of each other (of course they should register at the same website too). Blessing Skin is an open-source project written in PHP, which means you can deploy it freely...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SM3SUM(2)

    SM3SUM(2)

    Command-line GM/T 0004-2012 SM3 Recursive Hashsum Tool

    This new module can be used to compute SM3 message digest of files or memory blocks according to the specification GM/T 004-2012 Cryptographic Hash Algorithm SM3, published by State Encryption Management Bureau, China. This project is licensed under the ISC License. Copyright © 2020-2022 ALBANESE Research Lab Source code: https://github.com/pedroalbanese/sm3sum Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    XSIBackup-Classic

    XSIBackup-Classic

    Local and over IP backups for ©VMWare ©ESXi 5.1 to 6.7

    ...Crontab with configurable disk space autoprovision, set the room you want to reserve for your backups and rotate them. Full backups may be done with vmkfstools or by means of Rsync and its Delta algorithm (read: https://33hops.com/blog_xsibackup-rsync-considerations.html), to a local datastore or over TCP/IP tunneled through SSH, so any transfer over IP is secure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Namecoin

    Namecoin

    Distributed Naming System

    ...Use case examples: [Name] => [Value] DNS: domain_name => domain_zone_configuration Identity: user_name => user_public_identity (email, name, gpg key, etc) Timestamping: document_hash => document_infos (name, hash, owner, etc) Main features: * Distributed/decentralized: each user has its own copy of the full database. * Secure: security (with public/private keys) is deeply integrated in the software to allow only the owner of a name to modify it in the distributed database. * Pseudonymous: all transfers of data are public and linked to random generated addresses...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 5
    Shadowsocks for Windows

    Shadowsocks for Windows

    A secure socks5 proxy for Windows

    Shadowsocks for Windows is a free and open source, high-performance secured socks5 proxy designed to protect your internet traffic. It allows you to surf the web privately and securely, and offers a number of useful features such as HTTP proxy support, system proxy configuration, server auto switching and plugin support. Shadowsocks is incredibly fast, as it utilizes bleeding edge techniques with Asynchronous I/O and event-driven programming. It also has a flexible industry-level...
    Downloads: 84 This Week
    Last Update:
    See Project
  • 6
    DuplicatedFile

    DuplicatedFile

    Find out duplicate files

    Discovers duplicate files within a folder or disk and saves the list of discovered files to a file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    JavaScript MD5

    JavaScript MD5

    Compatible with server-side environments like node.js

    JavaScript-MD5 is a small, dependency-free implementation of the MD5 hashing algorithm written entirely in JavaScript, designed to run consistently across browsers, Node.js, and popular module loaders. It allows you to generate MD5 hashes from strings, arrays, ArrayBuffers, and other binary-like data types, making it useful for checksums, fingerprinting, and simple integrity checks on the client or server. The library is exposed as a plain function, so usage is as simple as calling md5(value) and receiving the 32-character hexadecimal hash.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    KISA Toolkit

    KISA Toolkit

    Korea Internet & Security Agency's Cipher Suite written in Go

    ...The Korea Internet & Security Agency (KISA) is distributing source codes that you can easily use. South Korean National Standard Algorithms: • LSH Message digest algorithm. 256/512-bit hash value. • ARIA 128-bit Block cipher with 128/192/256-bit keys. • LEA 128-bit Block cipher with 128/192/256-bit keys. • SEED 128-bit Block cipher with 128/256-bit keys. • HIGHT 64-bit Block cipher with 128bit key. Cryptographic Functions: • Symmetric Encryption/Decryption • Hash Digest • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab Visit: http://albanese.atwebpages.com
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Fastcoin (FST)

    Fastcoin (FST)

    The fastest software-based online payment system

    The fastest software-based online payment system RELEASE : v1.14.3.2 Fastcoin - Celebrating over eight years of fast & secure transactions. ------------------------------------------------------------------------ - Total coins will be 165,888,000. - 60 second block target (Modified in 2021) - Custom unique difficulty algorithm. - Retargets once every hour or 300 blocks. - Each block contains 32 coins which will be halved every year (or 2,592,000 blocks)
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 10
    AndroidOfferKiller

    AndroidOfferKiller

    Help you get a better offer

    AndroidOfferKiller is a curated collection of Android interview resources aimed at helping developers secure stronger job offers. It brings together notes and materials across topics such as Java and JVM basics, Android fundamentals, design patterns, data structures and algorithms, and LeetCode-style problem solutions. The repository also links to deep-dive articles on performance and common pitfalls, for example RecyclerView stutter and optimization strategies, making it a practical study...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    clzw

    clzw

    Implementation of LZW compression algorithm in C

    Simple, fast implementation of LZW (Lempel–Ziv–Welch) data compression algorithm in C. - Console encoder/decoder tools - OS independent - Could be used in embedded projects - Works with raw code-stream LZW features: - Hardcoded dictionary size - Variable code size - Code search is performed by hash table and embedded in dictionary linked lists (encoder) - No dynamic memory allocation
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    Whirlpool File Checker
    ...So, it only works on NTFS volumes. With that, you can rename, copy or move your files (to another NTFS volume) without losing the hashes, and without needing to do anything else. The Whirlpool algorithm is a strong 512-bit hash function. This tool uses several optimized implementations with SSE4.1 or SSE2 instructions when available. Each folder is recursively processed. You can use drag-and-drop, mix files and folders, pause and resume. 64-bit: https://sourceforge.net/projects/whirlpoolfilech/files/0.5/WFileCheck64.exe 32-bit: https://sourceforge.net/projects/whirlpoolfilech/files/0.5/WFileCheck32.exe At first use, please let the integrated benchark determine the fastest procedure for your hardware. ...
    Leader badge
    Downloads: 91 This Week
    Last Update:
    See Project
  • 13
    xxhsum for Windows

    xxhsum for Windows

    xxhsum 0.8.0 - print or check xxHash non-cryptographic checksums

    ...xxhsum supports a command line syntax similar but not identical to md5sum(1). Differences are: xxhsum doesn´t have text/binary mode switch (-b, -t); xxhsum always treats files as binary files; xxhsum has a hash bit width switch (-H); As xxHash is a fast non-cryptographic checksum algorithm, xxhsum should not be used for security related purposes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Secure File Vault

    Secure File Vault

    A very secure file vault for private files to avoid hackers

    A File vault to store all of your personal items, this file vault could not be brute forced (impossible because of the hashing algorithms). It uses a combination of veracrypt, winrar, 7zip to encrypt your files to ensure that they are secure and not be seen by someone. Once you start to create the file vault, your password gets hashed a million times (only takes 3 seconds) then base 64 3 times and hashed 1 more time, it uses a combination of SHA256, SHA512 and lot of other secret...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    IPFS Browser Sandbox

    IPFS Browser Sandbox

    An experimental p2p browser built on IPFS

    The IPFS Browser Sandbox is not a product intended to ship to end users. It is a Technology Preview for how IPFS/IPLD resources could be represented in web browser components. It is here for demos, experimentation and fun times. It's also not secure and may be partly or entirely broken. Use at your own risk.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16
    TraySafe

    TraySafe

    Elegant and reliable profile data storage

    ...PIN functionality is included in versions 1.1.0 and above. The serious perk of the app is that all the info is saved as encrypted data in the data.tsf file in the program directory. The simple yet effective encryption algorithm has a password hash, salt key and vigenère cipher key that are changed with every update. The only thing you have to do when updating is to delete the .tsf files and re-enter all your info again so that it can be encrypted using the new parameters. Detailed How-To can be found in the project wiki.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    Gutmann Algorithm Secure File Deletion

    Using Gutmann method for securely deleting files in Windows.

    Gutmann method uses 35 passes over the region to be deleted, 8 of them are Pseudo-random. Considered by some to be highly effective for preventing file recovery. Requires .NET Framework 4.0 --- Systems & Safety Establishment https://sarab.me Source Code available in c# with comments. Reference: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
    Downloads: 5 This Week
    Last Update:
    See Project
  • 18
    SafeBox

    SafeBox

    Truly anonymous and secure file sharing

    Anonymity No registrations. Immediately after installing the application, you can start sharing files. Strong cryptography Proven standards of cryptography (PGP, RSA 2048). There is not a single case of hacking data encrypted with PGP using full brute force or cryptographic algorithm vulnerability. Files are not stored in the cloud as soon as the recipient receives the file, it is instantly removed from the cloud. Thus, it is impossible to get files to anyone other than the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    egg-token

    egg-token

    Egg.js middleware that uses encrypted token to authenticate

    Egg.js middleware that uses encrypted token to authenticate.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Manifest Maker

    Manifest Maker

    NO LONGER MAINTAINED

    NO LONGER MAINTAINED, NO LONGER SUPPORTED Manifest Maker is a graphical Python application which takes a file or group of files and creates a plain text manifest list of each item. The manifest includes the file name (including directory structure) as well as a checksum of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    cg-invoice

    cg-invoice

    Invoice and office utilities program for customer managment

    cg-invoice is a HTML5, Bootstrap, PDO simple yet productive way to write invoices and then retrieve the client data in more than one way. Invoicing invoices from anywhere online. View table or you can reprint the invoice as it was originally written. Business management for quotes or estimates. Contacts and vendors listing tabs for easy search. Office or personal tools to track customers, inventory, mailing lists, company phone numbers with a scheduler calendar included. Scripts written...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    iTelliHashExcel

    iTelliHashExcel

    Cryptographic Hashing Application for Excel Files

    iTelliHashExcel is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    v1pad

    One-time-pad encryption using a virtual pad

    v1pad is a command-line tool that encrypts and decrypts files using one-time-pad encryption. v1pad uses a virtual pad, meaning that the one-time pad is generated dynamically based on user input instead of being stored in a file. The name v1pad is an abbreviation for Virtual One-Time Pad.
    Downloads: 0 This Week
    Last Update:
    See Project