Search Results for "secure hash algorithm" - Page 5

Showing 182 open source projects for "secure hash algorithm"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    Checksum Directory

    Checksum Directory

    Check some checksum!

    A secure and centralized way to get checksums of common downloads. You will find the usual MD5 hash, but also the newer and more secure hashes like SHA-1, SHA-256 and even SHA-512. If the filesize and all up to four hashes match, you should be save to use that downloaded file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    QuazarCoin
    QuazarCoin (QCN) is a new cryptocurrency based on the CryptoNote and uses the CryptoNight algorithm. QuazarCoin protects your data and privacy with help of completely anonymous transactions with ring signatures.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Mjollnircoin is a decentralized digital currency that enables instant payments to anyone in the world; it is a lite version of Bitcoin using a redundant cryptographic function as a proof-of-work algorithm. Mjollnircoin is a people's currency, intended to be efficiently mined with consumer-grade hardware. It is ultra secure, ASIC resistant, Multipool resistant and rare with a total number of 42 million mjollnircoins
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    ...Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. The password you provide is hashed ( SHA256 ) and saved into the encrypted file to check if the password provided is correct.This algorithm has limitations in general more the numbers of relative characters in the password to plaintext more secure will be the encryption. XOR encrypt has a 3.5 of 5 editors rating from softpedia http://www.softpedia.com/get/Security/Encrypting/XOR-Encrypt.shtml
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    ...Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    SSSSaD

    Smart Secure Sexy Streaming and Downloading

    Allows for propper serving of Ogg (and other media) files, whether they are downloading inline or as an attachment. It also tracks downloads by recording only the hash of the user rather than that person's IP and other personal data. This is very important in our time where an admin maybe forced to give the logs identifying all the users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 10
    Hash Me

    Hash Me

    Create different hash results to take an unique file identification.

    Very easy and simple to use. The Hash Me is a free tool that can create differents hash results from files using differents algorithms. Besides that, the app can be used to create an additional file which can be distributed with the original file. This one creates the chance for the receiver confirm that the original file didn't take any modification along the way. ============= HOW IT WORKS ============= * For full help description, type "hashme.exe -help" at command line. => hashme.exe <filename> <hash algorithm> Output the hash result from specified file. => hashme.exe <filename> -c Create a .hashme file with hash information about the specified file. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    J! Secure Password Hashes
    J! Secure Password Hashes provided an easy access to all Joomla! password hash algorithms and the Drupal 7 SHA-512 hashing algorithm. Compatible: Joomla! 2.5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    PassWordFromHash

    Program generates passwords from hash, not from random numbers.

    Algorithm: 1. Concatenate "User", "Resource", "Master password" (yes, it is correct order!) to one string. 2. Calculate RIPEMD-160 hash of that string. 3. Convert hash to big number (from 0 to 2^160 - 1). 4. Translate number to 62-sign numeral system. 5. Each digit is represented as char 0-9, A-Z, a-z. 6. So, we get a password! Length is not more than 28 letters, because 62^28 is greater than 2^160.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Darkhash

    Darkhash v1.0 Hash Collision

    A small suite of scripts to crack hash algorithms and more. The following are supported- -->MD4 -->MD5 -->SHA1 -->SHA224 -->SHA256 -->SHA384 -->SHA512 -->RIPEMD160 There will be more algorithm support to come. There is also a utility to create these supported hashes and another utility to encode and deocde strings with Base64. Includes password.lst from John The Ripper.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    BBQCoin

    BBQCoin

    BBQCoin - The Official Client Development and Client Download site

    WARNING! A so called other BBQCoin sourceforge.net link http://sourceforge.net/projects/bbqcoin-org/ has appeared on the scene claiming to be the only valid or secure download link for the BBQCoin QT wallet. Download at your own risk. BBQCoin is a peer-to-peer Internet currency that enables instant payments to anyone in the world. It is based on the Bitcoin protocol but differs from Bitcoin in that it can be efficiently mined with consumer-grade hardware. BBQCoin provides faster transaction confirmations (2.5 minutes on average) and uses memory-hard, scrypt-based mining proof-of-work algorithm to target the regular computers and GPUs most people already have. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    qlsdup

    GUI based lightweight duplicate file finder / remover.

    ...This is basically a reimplementation of dupfinder as: it doesn't compile on my computer, the executable won't work either, the projects seems dead and I didn't wanna work through the original code. So Look'n'Feel should be somewhat the same, though some changes have been made. Algorithm is simple and suitable for large file sets with few differences: basic set of duplicate candidates is determined by file size, then candidates are compared byte-wise. So for files which don't start to differ by growing at the tail it reduces read operations greatly compared to hash-based comparision (i.e. test case: 40GB of files, 16GB RAM, many differences: initial compare (uncached by OS) around 300sec, subsequent compare (relevant file parts cached by OS) ca. 2sec) Note: this program is not related to lsdup
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Wave Framework

    Wave Framework

    Open Source API-centric PHP Micro-framework

    Wave is a PHP micro-framework that is built loosely following model-view-control architecture and factory method design pattern. It is made for web services, websites and info-systems and is built to support a native API architecture, caching, user control and smart resource management. Wave is a compact framework that does not include bloated libraries and features and is developed keeping lightweight speed and optimizations in mind. While not necessary for using Wave Framework, it comes by...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    encr

    encr

    A symmetric-key cryptosystem implementation in VB.NET..

    Source code and further info on GitHub: https://github.com/toplel/encr
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Hasher

    A hash ecryption program with many customizations

    This program is focused on making the cracking process of the encrypted data an easy task for the intended receiver of the message. The program lets you create encrypted data out of your text input. It supports many different algorithms, and uses windows 1250 character map, so it supports lots of special characters properly. It was designed to be able to handle long texts if needed, it separates the input to words at spaces. The supported algorithms...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    AUH1

    The new Hash Algorithm

    AUH1 - The new Hash Algorithm Alex Ulmer Hash 1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Ajax Chat

    Chat application using MySQL, PHP and Javascript

    This web application will allow anyone to register using a first and last name and then once logged in it shows the user a list of people that are logged in right now. If they click user 2's name it pops up accept or cancel buttons for user 2. Once they click accept a chat box appears instead of the list of users you can chat with. It only allows you to chat with 1 person at a time. Later we could allow you to chat with more than 1 person in a chat box or more than 1 chat box at a time like...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 21
    CrackThis!

    CrackThis!

    Data Encrypton Software utilizing IMPACT

    We developed a classic solution that reflects the very nature of quantum mechanics in whole, ultimately demonstrating the raw power of numbers. We developed a truly irreversible one way algorithm which, when applied to information, both encrypts and decrypts it. That is to say that the algorithm which encrypts the information works in the same direction as the algorithm that decrypts it. This in itself is the very nature of quantum mechanics - "forward only". Through a quantum-entanglement-like operation, we created very robust encryption methodology which will secure information for some time to come through sheer numbers and flexibility. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Weeny Free Password Manager

    Weeny Free Password Manager

    Manage all your passwords in an encrypted database.

    ...You can put all your passwords in one database, which is locked with one master key or a key file. So you only have to remember one single master password or select the key file to unlock the whole database. The databases are encrypted using secure asymmetric cryptographic algorithm. The secure asymmetric cryptographic algorithm includes: 3DES, Blowfish, Cast128, DES, Ice, Ice2, RC2, RC4, Rijndael, Serpent, Tea, Thin Ice and Twofish.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23

    MD5HashCracker

    Cracks MD5 hashes using brute force attack

    The MD5 hash algorithm is widely used and is vulnerable to dictionary and brute force attacks. A dictionary attack and database will be added for this program later.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    SAMSON - Secure Authentication Modules

    SAMSON - Secure Authentication Modules

    Modules for remote attestation.

    The Secure Authentication Modules (SAMSON) are a set of modules designed to work together to provide a mechanism for doing remote authentication of a Linux system. It utilizes the IMA logic (introduced to the Linux kernel in 2.6.30) to perform a SHA-1 measurement of all executables prior to their being placed in execution, either as a program or as a memory mapped file mapped for execution.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project