Showing 745 open source projects for "hash"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Context for your AI agents Icon
    Context for your AI agents

    Crawl websites, sync to vector databases, and power RAG applications. Pre-built integrations for LLM pipelines and AI assistants.

    Build data pipelines that feed your AI models and agents without managing infrastructure. Crawl any website, transform content, and push directly to your preferred vector store. Use 10,000+ tools for RAG applications, AI assistants, and real-time knowledge bases. Monitor site changes, trigger workflows on new data, and keep your AIs fed with fresh, structured information. Cloud-native, API-first, and free to start until you need to scale.
    Try for free
  • 1

    Class-Hashmap

    Class Hashmap Code

    This implementation uses a simple hash function that takes the modulus of the hash value with the size of the hashmap to get the index of the bucket where the key-value pair should be stored. It handles collisions by using a linked list to store multiple key-value pairs in the same bucket. The add method takes a key-value pair and adds it to the hashmap. If the bucket at the index returned by the hash function is empty, it creates a new linked list with the key-value pair. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    password-generator

    password-generator

    passwort, passwort-generator, password, password generator

    Passwort-Generator in Python. passwort-generator.exe md5 hash: fccfcf626e84382fd63d079f94f195f1
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    QRCodeGenerator

    QRCodeGenerator

    qrcode, qrcode-generator, qrcode generator

    Dies ist ein Pythonscript zum Erstellen von farbigen QR-Codes. Die Größe und die Fehlerkorrektur sind einstellbar. Es werden die Dateiformate PNG, BMP und JPEG unterstützt. QRCodeGenerator.exe md5 hash: bf9039774069533943a5b424341b998b
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    CrackMapExec

    CrackMapExec

    A swiss army knife for pentesting networks

    CrackMapExec (CME) is a versatile post-exploitation and enumeration tool designed for pentesters and red teams to assess Active Directory environments. It supports credential spraying, command execution, file transfers, and module-based extensions across SMB, RDP, LDAP, and other protocols. CME provides automation and insight into Windows networks and is commonly used during lateral movement and domain enumeration phases.
    Downloads: 9 This Week
    Last Update:
    See Project
  • Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
    Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

    Focus on your application, and leave the database to us

    Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
    Try for free
  • 5
    LBRY SDK

    LBRY SDK

    The LBRY SDK for building decentralized content apps

    ...LBRY also provides a data network that consists of peers (seeders) uploading and downloading data from other peers, possibly in exchange for payments, as well as a distributed hash table used by peers to discover other peers. LBRY SDK for Python is currently the most fully featured implementation of the LBRY Network protocols and includes many useful components and tools for building decentralized applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    ...Key derivation functions: PBKDF2, scrypt, Argon2, HKDF. Includes sample command-line tools: - 'digest' - for calculating and verifying file checksum(s) using any of the supported hash algorithms (similar to md5sum or RHash). - 'cryptor' - for file encryption using Serpent-256 algorithm in AEAD mode. Check out the cppcrypto web site linked below for programming documentation.
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    OpenSSL for Windows

    OpenSSL for Windows

    OpenSSL Portable for Windows 32-bit and Android

    ...It is also a general-purpose cryptography library. GOST Engine: GOST 28147-89 - 64-bit block cipher with 256-bit key. GOST R 34.11-94 - Message digest algorithm. 256-bit hash value. GOST R 34.10-2001 - Digital signature algorithm. GOST R 34.10-2012 - Digital signature algorithm. GOST R 34.11-2012 - "Streebog" hash function 256 and 512-bit. GOST R 34.12-2015 - "Magma" block cipher (new). GOST R 34.12-2015 - "Kuznyechik" (Grasshopper) 128-bit block cipher. Check also: https://sourceforge.net/projects/edgetk/ Visit: http://albanese.atwebpages.com
    Leader badge
    Downloads: 1,727 This Week
    Last Update:
    See Project
  • 8
    mimikatz

    mimikatz

    A little tool to play with Windows security

    mimikatz is a tool that makes some "experiments" with Windows security. It's well-known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. It can also perform pass-the-hash, pass-the-ticket or build Golden tickets; play with certificates or private keys, vault and more.
    Downloads: 82 This Week
    Last Update:
    See Project
  • 9
    Edgeserver

    Edgeserver

    Next Generation Web3 Powered Edgeserver

    Edgeserver is an open-source, self-hostable, web3-native static file hosting service that allows for seamless integration with your favorite CI/CD systems. Deployed sites are instantly available over both http and ipfs as well as dynamically change ENS content-hash. Publish your site in mere minutes using your favorite CI/CD Integration or using CLI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Dominate AI Search Results Icon
    Dominate AI Search Results

    Generative Al is shaping brand discovery. AthenaHQ ensures your brand leads the conversation.

    AthenaHQ is a cutting-edge platform for Generative Engine Optimization (GEO), designed to help brands optimize their visibility and performance across AI-driven search platforms like ChatGPT, Google AI, and more.
    Learn More
  • 10
    StringHash

    StringHash

    Open Source Commandline String Hasher written in AutoIt3

    String Hash Tool - ALBANESE Research Lab © 2018-2019 Usage: StringHash.exe --str <string> --alg <algorithm> Algorithms: MD2, MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512 Example: StringHash.exe --str MyString001 (Default MD5) StringHash.exe --str "MyString 002" --alg sha-256 Copyright © 2018-2019 Pedro F.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    ...The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the files previously found on that data drive, or on a backup drive. Identifying changed files may be useful as a precaution against ransomware. The Support tab (above) links to a blog post discussing uses of the spreadsheet for that purpose. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    vulnerable-AD

    vulnerable-AD

    Create a vulnerable active directory

    ...It builds a domain controller (or augments an existing AD installation) with a variety of common misconfigurations and intentional weaknesses so practitioners can exercise attack techniques such as Kerberoast, AS-REP roast, DCSync, Pass-the-Hash, Silver/Golden Ticket attacks, and more. The project can create user objects with default or weak passwords, inject passwords into object descriptions, disable SMB signing, and manipulate ACLs to reproduce real-world privilege escalation and persistence scenarios. A convenience wrapper and examples make it straightforward to deploy in a local lab: you can install AD services, run the script on a domain controller, and generate hundreds of vulnerable accounts and conditions for testing. ...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    GOST Toolkit ☭

    GOST Toolkit ☭

    Cross-platform GOST Security Suite written in Pure Go

    Multi purpose cross-platform cryptography tool for symmetric encryption, hash digest, cipher-based message authentication code (CMAC) hash-based message authentication code (HMAC), digital signature, shared key agreement (VKO) and PBKDF2 function. GOST is GOvernment STandard of Russian Federation: GOST 28147-89 64-bit block cipher (RFC 5830) GOST R 34.11-94 hash function 256-bit (RFC 5831) GOST R 50739-95 data sanitization method (non-cryptographic) GOST R 34.10-2001 public key signature function (RFC 5832) GOST R 34.10-2012 public key signature function (RFC 7091) GOST R 34.11-2012 Стрибог (Streebog) hash function 256/512-bit (RFC 6986) GOST R 34.12-2015 128-bit block cipher Кузнечик (Kuznechik) (RFC 7801) GOST R 34.12-2015 64-bit block cipher Магма (Magma) Source code: https://github.com/pedroalbanese/gosttk Visit: http://albanese.atwebpages.com
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    Transaction Grabber V1

    Transaction Grabber V1

    Grabbing and scraping all transaction hash and other details bitcoin

    Scrap and Grabbing All Details Transaction (TXID) Bitcoin From Blockchain and any free block download and save to text file with filter details (HASH ID , ADDRESS, VALUE , ...)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    DevToysMac

    DevToysMac

    DevToys For mac

    DevToysMac is a macOS-native development toolkit, modeled after Microsoft’s DevToys, offering a suite of utilities for transforming and encoding data. It includes converters (JSON ↔ CSV), hash generators, code formatters, and other essential developer tools—all packaged within a sleek SwiftUI-based interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    KeyHolder password manager

    KeyHolder password manager

    Store your passwords in an offline encrypted file!

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 5 This Week
    Last Update:
    See Project
  • 17
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    audio-msg

    Storing audio messages in a chain of urls.

    ...Matlab is needed to record, upload, download and play the audio msgs. --- Audio frames are hidden in url-strings stored on name-servers. Audio frames are linked using the hash of neighbouring frames. The audio file is restored (downloaded) by knowing the last hash. Hashes are usually 8 character long. By transmitting those 8 characters, we are transmitting the audio.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    CityHash

    CityHash

    Automatically exported from Google code CityHash

    CityHash is a family of non-cryptographic hash functions optimized for extremely fast and high-quality hashing of strings on modern CPUs. Developed by Google, it is implemented in C++ and designed to efficiently handle both short and long inputs using techniques such as mixing operations and CPU-specific optimizations. CityHash offers multiple hash sizes—32-bit, 64-bit, 128-bit, and 256-bit variants—with the CRC-based versions leveraging hardware acceleration on CPUs that support SSE4.2 CRC32 instructions. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 20
    NBMiner

    NBMiner

    GPU Miner for ETH, RVN, BEAM, CFX, ZIL, AE, ERGO

    ...For GPUs with Hynix GDDR6 memory, LHR mode is not recommended for the poor performance. Improve performance on Grin29 & AE. Add support for mining SERO, algo progpow_sero. Change devfee in percentage, [0-5]. Set to ‘0’ to turn off devfee with lower hash rate. Otherwise, devfee = max(set_value, default_value). Memory timings optimize for Nvidia GDDR5 & GDDR5X gpus. range [1-6]. Higher value equals higher hashrate. Individual value can be set via comma seperated list. Power limit may need to be tuned up to get more hashrate. Higher reject share ratio can happen if mining rig hits high temperature, set lower value of -mt can reduce reject ratio.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    Vue Router

    Vue Router

    The router for Vue.js

    ...Nested route/view mapping; modular, component-based router configuration; route params, query, wildcards; view transition effects powered by Vue.js' transition system; fine-grained navigation control; links with automatic active CSS classes; HTML5 history mode or hash mode, with auto-fallback in IE9; customizable Scroll Behavior. Creating a Single-page Application with Vue + Vue Router feels natural: with Vue.js, we are already composing our application with components. When adding Vue Router to the mix, all we need to do is map our components to the routes and let Vue Router know where to render them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    jpg-msg

    Storing small image files in a chain of urls.

    .... --- Jpg data are hidden in url-strings stored on name-servers. Jpg data are concatenated using the hashes of neighbouring frames. The jpg file is restored (downloaded) by knowing the final hash created. Hashes are usually 8 character long. By sharing those 8 characters, we are actually sharing the jpg file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    hashmap

    hashmap

    A Golang lock-free thread-safe HashMap optimized for fastest access

    ...It is not a general-use HashMap and currently has slow write performance for write-heavy use. The minimal supported Golang version is 1.19 as it makes use of Generics and the new atomic package helpers. Reading from the hash map for numeric key types in a thread-safe way is faster than reading from a standard Golang map in an unsafe way and four times faster than Golang's sync.Map. Technical design decisions have been made based on benchmarks that are stored in an external repository: go-benchmark. The library uses a sorted linked list and a slice as an index into that list. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    FileVerifier++
    FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
    Leader badge
    Downloads: 54 This Week
    Last Update:
    See Project
  • 25
    GMSM Toolkit ☭

    GMSM Toolkit ☭

    Cross-platform GMSM Security Suite written in Go

    GMSM Toolkit v1.2.3 ☭ Multi purpose cross-platform cryptography tool for asymmetric/symmetric encryption, cipher-based message authentication code (CMAC), recursive hash digest, hash-based message authentication code (HMAC) and PBKDF2 function. SM2/SM3/SM4 Chinese National Standard Algoritms: • GM/T 0003-2012 - SM2 Public key algorithm 256-bit. • GM/T 0004-2012 - SM3 Message digest algorithm. 256-bit hash value. • GM/T 0002-2012 - SM4 Symmetric block cipher with 128-bit key. Cryptographic Functions: • Asymmetric Encryption/Decryption • Symmetric Encryption/Decryption • Digital Signature (ECDSA) • Shared Key Agreement (ECDH) • Recursive Hash Digest + Check • CMAC (Cipher-based message authentication code) • HMAC (Hash-based message authentication code) • PBKDF2 (Password-based key derivation function 2) • TLS Copyright (c) 2020-2021 Pedro Albanese - ALBANESE Lab. ...
    Downloads: 0 This Week
    Last Update:
    See Project