Showing 744 open source projects for "hash"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Repair-CRM Icon
    Repair-CRM

    For small companies that repair and maintenance customer machines

    All-In-One Solution with an Online Booking portal for automating scheduling & dispatching to ditch paperwork and improve the productivity of your technicians!
    Learn More
  • 1
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    ...The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. A filename conversion table is created to restore the concatenation order during a restore. The method aims to guarantee confidentiality, integrity, and availability of data, regardless of the trustworthiness of the chosen storage environment, while protecting against data breaches and unauthorized access. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    BimmerLink Log Analysis

    BimmerLink Log Analysis

    BMW / MINI Bimmerlink Log Visualizer

    ...It must not be used for real diagnostics, vehicle troubleshooting, or safety-critical decisions. For any official or accurate diagnosis, always rely on certified tools or professional automotive technicians. SHA256 hash of BimmerLogAnalyzer.exe: ae3c7cd66bf9f34736dc004a2ba4e92435e3736eac114b78ee02f0d14210d33a DETAIL; https://github.com/aaasci/bimmerlink_log_analysis
    Downloads: 9 This Week
    Last Update:
    See Project
  • 3
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure Encryption algorithms currently known: AES-GCM, AES RIJNDAEL, PGP, AES (String Crypto 256 Bit Key) SERPENT, CHACHA20, XCHACHA20-POLY1305. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    React-Cryptographic-Toolkit

    React-Cryptographic-Toolkit

    A simple cryptographic toolkit built with React

    Disclaimer: The "React-Cryptographic-Toolkit" is an independent software application and is not affiliated with or endorsed by Meta Platforms, Inc. "React" is a registered trademark of Meta Platforms, Inc. This name is used solely for identification purposes. You can use this app to encrypt your data, hash strings, and calculate tags using the available HMAC algorithms. This app is provided with no warranty or guarantees of any kind. Use it at your own risk! Check it out at https://northstrix.github.io/React-Cryptographic-Toolkit/ The related article is available at https://medium.com/@Northstrix/react-and-cryptography-creating-my-own-toolkit-40944af4d534
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rent Manager Software Icon
    Rent Manager Software

    Landlords, multi-family homes, manufactured home communities, single family homes, associations, commercial properties and mixed portfolios.

    Rent Manager is award-winning property management software built for residential, commercial, and short-term-stay portfolios of any size. The program’s fully customizable features include a double-entry accounting system, maintenance management/scheduling, marketing integration, mobile applications, more than 450 insightful reports, and an API that integrates with the best PropTech providers on the market.
    Learn More
  • 5

    Dynamic Arrays and Hashes (Delphi, C++)

    Very fast classes for working with Dynamic Arrays in Delphi and C++

    ...Flexible memory control, functionality that standard containers do not have, fast operations (assembler implementation for x86 and x64 platforms). Available for Delphi all latest versions and for C++. Powerful Hash and Double Hash classes to work with pairs of values (key and value) and with values that have two keys (key1, key2, value). Give it a try and let me know how it works.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    twitch-batch-downloader

    Automate the download of entire Twitch.tv channels

    Automate the download of entire Twitch.tv channels with its metadata. Save each Twitch video into its own folder, with date and time values, video ID, stream metadata, frame screenshot, .ts parts list and sha256 hash. Keep the original ts files and generate mp4 files from them. It requires a shell and some command line utilities. See README.md for details in the Code/git section.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 7
    JVerifier An hash code verifier JVerifier is a command line application that verify checksums from a GNU-style file. Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    WinHasher

    Very simple file and text hashing tool for Windows

    Tiny script will find hash digest of files or text by calling on Microsoft's "certutil.exe", using MD4, MD5, SHA1, SHA256, SHA384, or SHA512. Simple and self explanatory. *EDIT 5/3/25, I just realized that there is another project entitled "WinHasher", it appears to kind of do the same thing but uses native code rather than Microsoft's "certutil". If that's what you're looking for, it's here: https://github.com/gpfjeff/winhasher
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9

    Quaternion Lorentz

    Complex quaternion calculator with Lorentz boosts and rotations

    C++ code to perform the Lorentz boosts and rotations of special relativity using complex quaternions The interface is a complex quaternion console-based calculator with operations + - * / ^ and functions for Lorentz boosts and rotations. THEORY Complex quaternions have form q = A + B * I + C * J + D * K with A, B, C, D complex I * I = -1 , J * J = -1 , K * K = -1, I * J = K, J * I = -K , J * K = I,K * J = -I, K * I = J, I * K = -J Transpose T takes I into -I, J into -J, K...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Financial reporting cloud-based software. Icon
    Financial reporting cloud-based software.

    For companies looking to automate their consolidation and financial statement function

    The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
    Learn More
  • 10
    3DPass

    3DPass

    The Implementation of The Ledger of Things Node. Layer 1 decentralized

    ...It introduces a novel consensus mechanism called Proof of Scan, where miners validate by running recognition algorithms on 3D objects. Each object produces a reproducible cryptographic fingerprint (HASH ID) that is stored on-chain. If the same object is submitted again, the network rejects it, ensuring that only one of a kind assets can be registered. This approach enforces authenticity at the content level, something traditional file storage and NFT systems cannot achieve. The features of 3DPass include: Proof of Scan consensus, enforced uniqueness of 3D objects, CPU-only mining with no pools, object tokenization through the 3DPRC-2 standard, EVM compatibility, native web and mobile wallets, and open-source community governance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Compiled Pastoral Edition

    Compiled Pastoral Edition

    The "Compiled Pastoral Edition" of the Holy Bible.

    ...Compiled Pastoral Edition of the Holy Bible. 2024(CCYY). 200 208 220 1 4 5 229 230 071 242 253 268 291 292 306 ~~~IDENTIFIER~~~ DC:IDENTIFIER:URN:CLSID:2A01069A-3C88-1042-60E5-EA4F92E3AE60 SOURCE:compiled-pastoral-edition-of-the-holy-bible HASH(SHA1):360c01347aecafcb1e181185e7cfd297ffe9f10b ~~~COPYRIGHT~~~ THIS PUBLICATION ("Compiled Pastoral Edition") IS PROTECTED BY COPYRIGHT (Copyright © 2024, ALEXANDER CAESAR N. ALMEDA), HOWEVER, RELEASED ON ANY JURISDICTION WORLDWIDE UNDER THE TERMS AND CONDITION ON MATTERS OF PUBLISHED WORKS OF PUBLIC DOMAIN. ~~~PUBLISHER~~~ ALEXANDER CAESAR N. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    FileCentipede

    FileCentipede

    File centipede is an internet file download manager

    File centipede is an internet file download/upload manager, Torrent client, WebDAV client, FTP client, and SSH client. It's fast, customizable, user-friendly, multi-protocols supported, and free with no ads. It also contains many useful auxiliary tools such as HTTP requester, file merge, and encoders. With the browser integration, you can download audio and videos from websites, even encrypted videos. File centipede makes everything easy and efficient, it's the best internet download...
    Downloads: 69 This Week
    Last Update:
    See Project
  • 13
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on...
    Leader badge
    Downloads: 216 This Week
    Last Update:
    See Project
  • 14
    RoboSuite 1.3

    RoboSuite 1.3

    The definitive solution to manage your backups and file copy operation

    # RoboSuite v1.3 - The Advanced RoboCopy GUI ## Introduction RoboSuite v1.3 is a powerful, free, and feature-rich graphical user interface (GUI) for the Windows command-line tool RoboCopy. Designed by Gianpaolo Aggiusti, this software elevates file copy and synchronization operations, making complex tasks simple and accessible to all users. Its purpose is to provide complete and intuitive control over RoboCopy, eliminating the need to memorize complex commands while adding a host of...
    Leader badge
    Downloads: 58 This Week
    Last Update:
    See Project
  • 15

    ProxyCrypt

    Encrypted volumes through command line

    ...See the documentation for more informations and an example of use: https://sourceforge.net/p/proxycrypt/doc/ Requirements: - Windows 7 or later - Arsenal Image Mounter or ImDisk Virtual Disk Driver - Administrative privileges - 64-bit CPU with SSE3 instructions - About 1 GB of RAM temporarily required for password checking with default settings Hashes of all versions: https://sourceforge.net/p/proxycrypt/doc/Hash
    Downloads: 24 This Week
    Last Update:
    See Project
  • 16

    libfc4c

    Fast containers for C language

    C dynamic containers are missing in the standard, so almost every single project in C uses different implementations. This library is yet another implementation of few basic containers, optimized for speed. A simplified interface to libarchive allows to save the containers in a compressed form. All the containers are 32bit. This greatly improves the performance (up to ~32%) and reduces the memory consumption (up to 41%) on 64bit systems. All the containers are pre-allocating buffers to...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17

    C++ Complex Calculator

    C++ complex calculator with arrays, matrices, eigenvectors, functions

    ...Householder reduction is used for determinants, eigenvectors, and QR matrix factorization. Class Matrix and class Polynomial facilitate finding the characteristic polynomial. A hash table is used to do fast variable and function lookup (they are entries in the same table). Collisions are handled in the hash table by making each entry a linked list. Written as C++ classes using the STL libraries <complex> and <vector>. The Numerical Recipes routines zroots and laguer rewritten in C++ find the complex roots of a polynomial with complex coefficients. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    Custom Erase Algorithm by Mariano Ortu

    Custom Erase Algorithm by Mariano Ortu

    Secure file deletion algorithm with customizable overwrite patterns.

    This project provides a secure file deletion algorithm designed to permanently erase data by overwriting files with customizable patterns. It ensures that deleted files cannot be recovered by standard recovery tools, enhancing data privacy and security. The algorithm supports multiple overwrite passes with user-defined sequences, adapting to different security standards and user needs. It is implemented in C# with a focus on performance and reliability, suitable for integration into...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    ...It is designed to offer for C programmers common data structures with powerful algorithms, and hidden implementation. Available structures are lists, queues, stacks, hash tables, binary trees, binary search trees, red-black trees, 2D arrays, permutations, heaps and interval heaps. GDSL is free software distributed under the terms of the GNU General Public License.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Seditio

    Seditio

    Seditio CMS

    ...To install Seditio you need the following server software pre-installed: - WWW Server (Apache, nginx, etc) - PHP 5.4.0 or higher - MySQL 5.0.7 or higher - Server configuration You MUST ensure that PHP has been compiled with support for: - GD - Hash - Mbstring - MySQL - PCRE - Sessions
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Leashmore

    Leashmore

    Leashmore is an open-source Operations Management Software

    Leashmore is an open-source "Operations Management Software" distributed under the MIT License. It employs military-grade encryption alongside sophisticated integrity verification feature to ensure data security. You can freely modify and distribute copies and any modifications of the Leashmore. You can use Leashmore in commercial applications. GitHub page with the source code and the user guide can be found at https://github.com/Northstrix/Leashmore Leashmore requires .NET 6.0...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    FSTDFC

    File Search To Date Folder Copy

    Version 0.7 - 31st October 2024 Added option to specify multiple file wildcards for search criteria, separate multiple by space to use Font size changes to make the form easier to use Version 0.6 - 5th September 2024 Increased maximum file count from 100K to 1000K Any file with EXIF data showing the date will be used for the output folder naming, all other files will use the "LastWriteTime" as the parameter. Added counter showing the number of files still to be copied to the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    The program allows you to generate the hashes with the chosen algorithm (MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512) of a single file or an entire folder (you can choose to scan the folder recursively or not recursively). It supports drag and drop of files and folders. The hash can be exported to text files. Compiled with openjdk 8. Usage: param 1: exclude symbolic links (0 or 1) [mandatory], param 2: exclude hidden files (0 or 1) [mandatory], param 3: folders to exclude [optional], param 4: texts to exclude [optional] Example: java -jar JHashCode2.jar 1 1 /home/davide/snap,/home/davide/Video,/home/davide/vmware HomeBank Source code available on https://github.com/davidesestiliwork/JHashCode2 See also JVerifier at: https://sourceforge.net/projects/jverifier/ See also GenerateAndDownloadHash at: https://sourceforge.net/projects/generateanddownloadhash/ Thanks to DDR Diego for translating in spanish language
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits). Post-quantum oriented design — ARX-based sponge resistant to Grover-type attacks. Context and salt separation — unique hashing domains for each use-case. ...
    Downloads: 0 This Week
    Last Update:
    See Project