Showing 398 open source projects for "sha3-256"

View related business solutions
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
  • ConnectWise Cybersecurity Management for MSPs Icon
    ConnectWise Cybersecurity Management for MSPs

    Software and support solutions to protect your clients’ critical business assets

    ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.
  • 1
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    The Stanford Javascript Crypto Library is a project by the Stanford Computer Security Lab to build a secure, powerful, fast, small, easy-to-use, cross-browser library for cryptography in Javascript. SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Simple Encryption Engine encrypt / decrypt / change password for SQLite database for the future use with your Delphi project. [Using SQLite with FireDAC]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    File Info

    File Info

    A software that gives you information about your file(s)

    File Info is software that gives you information about your file(s) like CRC32, MD5, SHA-1, SHA-256, SHA-384, SHA-512, and other file info. It let you find the hashes and also verify any of them. Also you can export the results to a text file. Needs .NET 4.6 or newer to run. Works on Windows 7 (86/64), 8 (86/64), 8.1 (86/64), 10 (86/64) Version 0.6.3.5 [16/12/2018] 1. Fixed: Opening File Info with ‘On top’ selected does not make the form on top.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    HashOR

    HashOR is used to create 84 hashes of a string or file.

    HashOR can create 84 hashes from data or file input. It also can create a TTH and AICH.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Automated RMM Tools | RMM Software Icon
    Automated RMM Tools | RMM Software

    Proactively monitor, manage, and support client networks with ConnectWise Automate

    Out-of-the-box scripts. Around-the-clock monitoring. Unmatched automation capabilities. Start doing more with less and exceed service delivery expectations.
  • 5
    GMR Digital Signature System

    GMR Digital Signature System

    GMR digital signature system

    Private keys are insecure in cloud server infrastructure. Chrome: right click - translate into English! https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Spectre-NG_18052018.html System that creates key pairs and digital signatures and is based on the presumed difficulty of prime factorization. Please install on a virtual machine with Linux! Windows is not supported! German: System, das Schlüsselpaare und digitale Signaturen erstellt, und auf der vermuteten...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    iTelliHashExcel

    iTelliHashExcel

    Cryptographic Hashing Application for Excel Files

    iTelliHashExcel is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Anak Krakatoa Defined Crypt

    Anak Krakatoa Defined Crypt

    Uma implementação diferente do algorítmo de Virgenère

    Um dia precisei de um algoritmo simples de criptografia para usar em um de meus programas, com o intuito de encriptar strings de texto. Como não tive paciência para criar um, resolvi procurar na Internet. Achei o que eu estava procurando, mas ocorreu uma coisa muito inesperada... O algoritmo era genérico, ou seja, ele manipulava a sequência de texto informada e fazia um cálculo simples, alterando os caracteres um a um. Isso seria o ideal, mas infelizmente ele utilizava todos os 256 caracteres...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Downloads: 0 This Week
    Last Update:
    See Project
  • Holistically view your business data within a single solution. Icon
    Holistically view your business data within a single solution.

    For IT service providers and MSPs that need a data platform to manage their processes

    BrightGauge, a ConnectWise solution, was started in 2011 to fill a missing need in the small-to-medium IT Services industry: a better way to manage data and provide the value of work to clients. BrightGauge Software allows you to display all of your important business metrics in one place through the use of gauges, dashboards, and client reports. Used by more than 1,800 companies worldwide, BrightGauge integrates with popular business solutions on the market, like ConnectWise, Continuum, Webroot, QuickBooks, Datto, IT Glue, Zendesk, Harvest, Smileback, and so many more. Dig deeper into your data by adding, subtracting, multiplying, and dividing one metric against another. BrightGauge automatically computes these formulas for you. Want to show your prospects how quick you are to respond to tickets? Show off your data with embeddable gauges on public sites.
  • 10
    Space International SHIKA Crypto-suite

    Space International SHIKA Crypto-suite

    High-grade military diplomatics-grade cryptography suite

    ... are fully magnetic-proof. Designed by Ann Space, Chiko Space and Mika Space, senators of the Most High Senate of Space International, and military generals of the special division of the Infinite Military of Space International (Navy). Better than Serpent, Twofish and AES ciphers. Fully unbreakable. Reasonable performance for the assured ultra high-grade security. Approved by Space International senates and top militaries. At least 512-bits security. The market's offer is only 128 to 256 bits security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    GDriveSecureBackUp

    GDriveSecureBackUp

    Best way to make secure backup.

    Its developed as fully customizable program to backup files to Google Drive. It performs encrypted backup with encryption of file and folder names.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 12
    CrococryptFile

    CrococryptFile

    An encryption tool for creating file archives

    ... file dump. =Crypto Suites= For a full list of and details about supported crypto suites, please visit the CrococryptFile Homepage. Examples: - Password-based encryption (following PBKDF2) with AES-256, Twofish, Serpent, ... - Public key encryption using GPG/OpenPGP, Windows Keystore/CAPI with RSA/X.509 certificates - Cloaked (headerless) Password-based Encryption (AES-Twofish-256 cascaded) - ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 13

    MHISoft eVault

    Secure Password Vault and Password Manager

    https://github.com/mhisoft/eVault I just don't trust any online or third party vault for storing my personal information and passwords. So I created this open source. It is a secure password vault which is best suitable for storing passwords and personal data. All the data are stored in a encrypted data with AES 256 bit key encryption. You only need to remember one master password and a set of combination code to the vault. The password is stored in a hashed format and can't be reverse...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    MySuiteA

    This is not NSA Suite B. This is MySuiteA!

    MySuiteA is a cryptographic suite consisting of symmetric ciphers and hash algorithms, as well as two proof-of-concept quantum-safe asymmetric cryptographic algorithms for digital signature and key agreement. This suite implements: AES-128, AES-192, AES-256, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, NEWHOPE, REBLISS-512A, (and the self-devised)REBLISS-1024A, among a few other things...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16

    RElt

    calculates overlap, kinetic integrals for numerical atomic orbitals.

    .... For calculation of the integral over the rectangle any adaptive algorithm can be applied. The exemplary results were obtained by application of the adaptive Gauss quadrature. The implemented algorithm is described in my paper: "Numerical calculation of overlap and kinetic integrals in prolate spheroidal coordinates", International Journal of Quantum Chemistry, Volume 108, Issue 2, Year 2008, Pages 249–256 http://onlinelibrary.wiley.com/doi/10.1002/qua.21485/full
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Open-Hashtool

    Open-Hashtool

    Comfortable hash-tool for texts and files

    Open-Hashtool is an easy2use Qt based application, which can be used to calculate the hash (MD4; MD5; SHA-1; SHA-224; SHA-256; SHA-384; SHA-512; SHA3-224; SHA3-256; SHA3-386; SHA3-512) of texts and files. It's compatible with Windows and Linux. But Linux users need Qt5.1 or Wine (configuration: Windows Version <= Windows 2008) to run the Open-Hashtool. Please read the Wiki for compiling instructions.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    N2K-OS FreeDOS Distro

    N2K-OS FreeDOS Distro

    GUI Desktop for FreeDOS Related Systems

    N2K-OS is a Graphics User Interface built for MS-DOS, FreeDOS, and DOSBox. Testing models have even shown that they will run in a Virtual Machine as well. Initially being built on a 486 Machine that ranks as a low end Pentium 1, with 40 megabytes of ram, it currently runs like a dream for any machine of similar nature with SuperVGA and 256 Colors with ability to reach 800x600 (and soon to be much higher resolutions than that). Slowly being developed over the last few years (each time...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19

    bsum

    tiny DOS tool that computes BSD checksums of files

    bsum is a tiny tool (256 bytes!) that computes the BSD checksum of any file. It requires only a few kilobytes of memory, and is fast even on an 8086-class PC. bsum supports files of any size (as long as your file system is able to handle them). The BSD checksum is displayed in hexadecimal format (ie. four alphanumeric characters, like "C2E1"). bsum is an excellent candidate for veryfing data integrity on systems that are very constrained in terms of disk space, memory or CPU power. Typically...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    openChecksum

    openChecksum

    Check the MD5, SHA-1 and SHA-256 with an multiplatform tool.

    Check the MD5, SHA-1 and SHA-256 Checksum with an multiplatform easy tool developed with QT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    KeepSecret

    KeepSecret crypto Tool

    This tool help you to keep your files secret with AES-256-CBC. Github project directory: https://github.com/tarcisio-marinho/KeepSecret Download: https://sourceforge.net/projects/keepsecret/files/ks/download Installation: sudo cp ks /usr/bin/ks Sintaxe: usage: ks [-h] [-e] [-D] [-f] [-d] [-p] KeepSecret is a tool to cryptograph your files optional arguments: -h, --help show this help message and exit -e, --encrypt File to be Encrypted/Decrypted -D...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Binary Stream Editor

    A stream editor in java that can handle text/binary formats

    ... by default, has 256 single-byte characters. Data in the buffer is available as a charsequence to the commands for stuff like regex matching etc. The output can be redirected to a file, and an output encoding can be specified.The commands can also store/retrive arbitrary data for later use in a map. Evaluation of expressions in commands is done using Apache Jexl, and custom functions can also be used. Sample java usage and sample command line usage examples are included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    PeaUtils

    File management utilities: split & join, secure delete, crc/hash

    Suite of file management utilities: split and join files, secure delete, verify checksum and hash values: CRC32. MD5, SHA1, SHA-256, SHA3 and more. Spin-off of PeaZip project.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 24
    Eluvium Data Encryption Software

    Eluvium Data Encryption Software

    DATA PROTECTION SOLUTION FOR A SAFER WORLD

    Eluvium is an easy to use encryption software that uses 256-bit military grade encryption to protect your private files and prevent them from being modified, read or even theft. Protect all your sensitive personal and commercial information including your photos, credit card data, tax returns or any other private document. Eluvium, don't require an internet connection. We take our privacy policy very seriously, so we never have any knowledge of your password and no way to retrieve or reset...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Filelocker 2
    Filelocker is a web based secure file sharing application which facilitates easy file sharing between users at an organization and promotes secure data sharing habits.
    Downloads: 1 This Week
    Last Update:
    See Project