With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Bright Data - All in One Platform for Proxies and Web Scraping
Say goodbye to blocks, restrictions, and CAPTCHAs
Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
CheckSumTool allows user to calculate different (e.g. CRC, MD5, SHA-variants) checksums for files. It also can verify files against given (list of) checksums.
Ideal for conference and event planners, independent planners, associations, event management companies, non-profits, and more.
YesEvents offers a comprehensive suite of services that spans the entire conference lifecycle and ensures every detail is executed with precision. Our commitment to exceptional customer service extends beyond conventional boundaries, consistently exceeding expectations and enriching both organizer and attendee experiences.
Compiled by Alessandro de Oliveira Faria (a C implementation of MD6). The algorithm is a cryptographic hash developed at MIT by a team led by Ronald Rivest in response to the call for proposals for a SHA-3 cryptographic hash algorithm by the NIST;
A file hash generator. Generates MD5, SHA-1, SHA-256 and SHA-512 hashes for the selected file. Can choose any combination of the 4 hashes. Simple, Small and fast. Works great on ISO's and any other files. I might add in ability to compare hashes to
EBizCharge Payment Platform for Accounts Receivable
Getting paid has never been easier.
Don’t let unpaid invoices limit your business’s growth. EBizCharge plugs directly into the tools your business already uses to speed up payment collection.
DJ HACK: Distributed Java HAsh craCKer, is a program 100% JAVA where you can decrypt asymmetric hash keys (like SHA-X or MD5) in a distributed environment (cluster) with brute forcing attacks. Also, supports dictionary attacks.
SHA PadLock computes SHA-1 or SHA-256 file checksums using VIA Nano's processors hardware PHE engine. Currently it can only be run on VIA Nano processors (in Samsung NC20 netbook for example) under Windows. It was build using VIA PadLock SDK.
Tool "Contego" for encryption to plain text (UTF-8) and verification, testing and generation of MD5 and SHA-1 sums for files. Version 2.0 multilnguaje and fully operational. Encriptacion para texto plano (UTF-8) y utilidades para sumas MD5 y SHA-1.
Tool for encrypting files using blowfish, aes, des or cast5,
File hashing with md5, sha and ripemd160,
compresssion with gzip, and a nice user interface.
Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
The Cryptographic Hash Functions UNO Component for OpenOffice.org computes hashes (message digests) of text and files using following hashing algorithms: MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512
Kotak is just another cracking tool which is based on Java. It is used to crack various types of hash functions with various types of attacks. It's developed to be as simple as possible, so that anyone can use this tool easily.
Amnesia is a design-rich 'host-proof' web application that encrypts and remembers all sorts of personal information from passwords to private notes. Project now hosted at Google Code: https://code.google.com/p/amnesia-app/
This WebOS application generates RFC 2289 standard compliant one-time passwords. It supports the MD4 and MD5 message-digest algorithms as well as the SHA-1 hash algorithm and can be used with challenge-response OTP systems such as OPIE and S/KEY.
Simulates CT scan of lung nodules for volume measurement. To study the inter-scan difference and error with various slice interval, thickness, field-of-view etc. (Withdrawn because of intellectual property of TeraRecon Inc. Ask sha@terarecon.com)
This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.