Showing 223 open source projects for "sha"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    CheckSumTool allows user to calculate different (e.g. CRC, MD5, SHA-variants) checksums for files. It also can verify files against given (list of) checksums.
    Leader badge
    Downloads: 75 This Week
    Last Update:
    See Project
  • 2
    Java File Checksum tool for calculating an hash (MD5, SHA-1, SHA-256, SHA-512).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4
    Abstract Validation class. Dynamically create properties in a multidimensional associative array. Preg_match validation for multiple types (username, password, email, etc). Generates: Variable strength passwords and sha-512 encrypted unique ids.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Event Management Software Icon
    Event Management Software

    Ideal for conference and event planners, independent planners, associations, event management companies, non-profits, and more.

    YesEvents offers a comprehensive suite of services that spans the entire conference lifecycle and ensures every detail is executed with precision. Our commitment to exceptional customer service extends beyond conventional boundaries, consistently exceeding expectations and enriching both organizer and attendee experiences.
    Learn More
  • 5
    Compiled by Alessandro de Oliveira Faria (a C implementation of MD6). The algorithm is a cryptographic hash developed at MIT by a team led by Ronald Rivest in response to the call for proposals for a SHA-3 cryptographic hash algorithm by the NIST;
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    A GUI application for compution Blue Midnight Wish hash (SHA-3 candidate).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Minimalist utility to calculate MD5 and SHA based checksums on streams
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A file hash generator. Generates MD5, SHA-1, SHA-256 and SHA-512 hashes for the selected file. Can choose any combination of the 4 hashes. Simple, Small and fast. Works great on ISO's and any other files. I might add in ability to compare hashes to
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Secure Hash Algorithm Version 2 (SHA-256)
    Downloads: 0 This Week
    Last Update:
    See Project
  • EBizCharge Payment Platform for Accounts Receivable Icon
    EBizCharge Payment Platform for Accounts Receivable

    Getting paid has never been easier.

    Don’t let unpaid invoices limit your business’s growth. EBizCharge plugs directly into the tools your business already uses to speed up payment collection.
    Learn More
  • 10
    DJ HACK: Distributed Java HAsh craCKer, is a program 100% JAVA where you can decrypt asymmetric hash keys (like SHA-X or MD5) in a distributed environment (cluster) with brute forcing attacks. Also, supports dictionary attacks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    DocUMentDS
    Project moving to http://sourceforge.net/projects/documentds/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    jsSHA is a JavaScript implementation of all variants of the SHA family of hashes (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512) as well as HMAC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SHA PadLock computes SHA-1 or SHA-256 file checksums using VIA Nano's processors hardware PHE engine. Currently it can only be run on VIA Nano processors (in Samsung NC20 netbook for example) under Windows. It was build using VIA PadLock SDK.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    A MD5/SHA1/SHA-256 hasher written in wxPython 2.8 and python
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Contego Software
    Tool "Contego" for encryption to plain text (UTF-8) and verification, testing and generation of MD5 and SHA-1 sums for files. Version 2.0 multilnguaje and fully operational. Encriptacion para texto plano (UTF-8) y utilidades para sumas MD5 y SHA-1.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Tool for encrypting files using blowfish, aes, des or cast5, File hashing with md5, sha and ripemd160, compresssion with gzip, and a nice user interface. Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    kokla
    Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    The Cryptographic Hash Functions UNO Component for OpenOffice.org computes hashes (message digests) of text and files using following hashing algorithms: MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512
    Downloads: 3 This Week
    Last Update:
    See Project
  • 19
    Kotak
    Kotak is just another cracking tool which is based on Java. It is used to crack various types of hash functions with various types of attacks. It's developed to be as simple as possible, so that anyone can use this tool easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Amnesia.
    Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This WebOS application generates RFC 2289 standard compliant one-time passwords. It supports the MD4 and MD5 message-digest algorithms as well as the SHA-1 hash algorithm and can be used with challenge-response OTP systems such as OPIE and S/KEY.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Simulates CT scan of lung nodules for volume measurement. To study the inter-scan difference and error with various slice interval, thickness, field-of-view etc. (Withdrawn because of intellectual property of TeraRecon Inc. Ask sha@terarecon.com)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Grupo Content Management System
    A lightweight, simple, and minimalistic content management system intended to give users a fast experience.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    File integrity Checker for Mac OS X
    Downloads: 0 This Week
    Last Update:
    See Project