Showing 398 open source projects for "sha3-256"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Free CRM Software With Something for Everyone Icon
    Free CRM Software With Something for Everyone

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    Think CRM software is just about contact management? Think again. HubSpot CRM has free tools for everyone on your team, and it’s 100% free. Here’s how our free CRM solution makes your job easier.
    Get free CRM
  • 1
    Eluvium Data Encryption Software

    Eluvium Data Encryption Software

    DATA PROTECTION SOLUTION FOR A SAFER WORLD

    Eluvium is an easy to use encryption software that uses 256-bit military grade encryption to protect your private files and prevent them from being modified, read or even theft. Protect all your sensitive personal and commercial information including your photos, credit card data, tax returns or any other private document. Eluvium, don't require an internet connection. We take our privacy policy very seriously, so we never have any knowledge of your password and no way to retrieve or reset...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Filelocker 2
    Filelocker is a web based secure file sharing application which facilitates easy file sharing between users at an organization and promotes secure data sharing habits.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    Hi anybody, This 7z allow you hiding many files using LSB Steganographic method in many pics, also let you the possibility to cipher the hidden files using private and public key with ECC(Elliptic curve cryptography), using BouncyCastle Java library or AES-256 bits. HOW TO USE: Its software needs JRE 1.7 or Higher!! Just unzip the dist.7z file and open Faster-Hiding.jar file, you can download the sources. Please open tickets if you found a problem or copyright trouble...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Helps you to verify the integrity of the files. Hash Calculator for files. Using: CRC32 MD5 RIPEMD-160 SHA-1 SHA-256 SHA-384 SHA-512 Update: Added CRC32 Now supports big files (more then 4Gb) *Requires .NET 4.5
    Downloads: 1 This Week
    Last Update:
    See Project
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 5
    CryptBench

    CryptBench

    A Benchmark which tests CPU cryptography performance

    .... Camellia-256 4. IDEA 5. Chacha20 6. SHA-512 7. SHA3-512(Keccack) 8. MD5 9. Blake2b 10. Whirlpool By default the application uses a buffer size of 256MiB and each test runs for 2 secs(per library test). CryptBench uses Libcpuid for CPU info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CS Figures

    CS Figures

    Heuristic-based fractal and music generator-256+ systems.

    Welcome to CSFigures, the generative rendering program for all sorts of interpretations of digital roots. Digital roots in this program are constructed on a basis of a multiplication table, but with alternate counting systems contrasted, different from 0-9. The data is then analyzed by adding the imaginary digital symbols together, to achieve a single digit number, or alternately working with heuristics such as finding the last digit of each number. You may see your options once you make a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    waifu2x-ROS

    ReactOS and Windows XP compatible build of waifu2x.

    To speed up, use "-b 256 -j 4" options. The original is there: https://github.com/WL-Amigo/waifu2x-converter-cpp Here are some minor cosmetic changes (switch to control memory usage and slightly reformatted output) and files needed to build under MinGW32-W64. To recompile (in Linux), run "make clean; make". 2016-10-17 UPDATE: added simple GUI. 2016-10-18 FIX: corrected typo, added some crashes handling. 2016-11-20 UPDATE: - added "TTA" and "number of passes" options; - enabled RGB...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8

    Thread

    Converts a single-threaded Linux command into a multi-threaded monster

    With the use of the Boost C++ Libraries: https://sourceforge.net/projects/boost/ thread provides a pre-complied solution to turn a non-threaded Linux command into a threaded program. It is best used with a no cobbler flag or no overwrite option in the code. Example run: $./threaded.sh choose how many threads options: 2 4 6 8 12 16 32 64 128 256 512 1024 2056 4112 16448 32896 $64 "enter a full command to run multi-threaded:" $pdftotext ./pdfs/. $
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    This tool can create signature values based on ssign structure (RFC 5848: Signed Syslog Messages) to protect syslog messages (RFC 5424: The Syslog Protocol). The cryptographic protection of log messages is useful in order to satisfy requirements of General Data Protection Regulation (GDPR - 2016/679/EU).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    JBrute

    JBrute

    Open Source Security tool to audit hashed passwords.

    JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial apps. It is focused to provide multi-platform support and flexible parameters to cover most of the possible password-auditing scenarios. Java Runtime version 1.7 or higher is required for running JBrute. Supported algorithms: MD5 MD4 SHA-256 SHA-512 MD5CRYPT SHA1 ORACLE-10G ORACLE-11G NTLM LM MSSQL-2000 MSSQL-2005 MSSQL-2012 MYSQL-322 MYSQL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    CyberCrypt

    .NET Library for Encryption/Decryption

    CyberCrypt: ----------------- .NET Library for Encryption/Decryption Usage: ---------- Encrypting file using AES (256 bits): CyberCrypt._AES256.EncryptFile("C:\example.txt", "YourPassword") Decrypting file using AES (256 bits): CyberCrypt._AES256.DecryptFile("C:\example.txt", "YourPassword") Hashing string using SHA512: CyberCrypt._SHA.SHA512Hash("A string that will be converted to SHA512 hash.")
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Hash Forcer

    Simple Brute forcer for hashes

    Simple Brute forcer for "MD2", "MD4", "MD5", "SHA-1", "SHA-256", "SHA-384", "SHA-512", "Base64", "HMACMD5", "HMACSHA1", "HMACSHA256", "HMACSHA384", "HMACSHA512", "HMACRIPEMD160", hashes
    Downloads: 2 This Week
    Last Update:
    See Project
  • 13

    pngnq-s9

    A modified pngnq: convert png images to 256 colours.

    pngnq-s9 is a modified version of pngnq, the neural network colour quantizer for png images. Like pngnq, pngnq-s9 takes a full 32 bit RGBA png image, selects a palette of up to 256 colours, and then redraws the image in 8 bit indexed mode. The resulting image can be up to 70% smaller than the original. pngnq-s9 adds several new options to pngnq including the ability to augment a user-supplied palette, the ability to quantize in the YUV colour space, and the ability to give more or less...
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 14
    MicroZip

    MicroZip

    Create,extract and encrypt ZIP,GZIP,TAR,BZIP2,TAZ files on Java mobile

    MicroZip is a powerful file compression and encryption utility for mobile phones which allows you to create and extract compressed archives in multiple formats and encrypt sensitive information with powerful AES-256 encryption. MicroZip can create and extract ZIP,TAR,TGZ,TBZ2 archives and extract many other formats as JAR,GZ,BZ2,TBZ,WAR,BZIP2,GZIP,Z,TAZ,CBZ etc. MicroZip allows you to extract selected files without extracting the whole ZIP archive. MicroZip also supports encrypted ZIP...
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15

    xCrypt

    256-bit encode/decode

    256-bit encode/decode file based on xLogic algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Hash

    Hash

    Hash: File Checksum Generator

    Hash is fast and simple java utility program for calculating and verifying checksums for files and text. Hash can generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 checksum values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Simple Number Converter

    Simple Number Converter

    Easely convert your hexadecimal, binary, decimal and octal numbers!

    Here you are a brand new version of our software, now easier to use, more lightweight than usual and now compatible with legacy operating systems!! Convert your numbers between most popular bases with three clicks! Minimum system requierements: - Intel Pentium II 400 MHz processor or better - 96 MB of RAM - Microsoft Windows 98, 98SE, ME, 2000, XP, Server 2003, Vista, Server 2008, 7, Server 2008 R2, 8, Server 2012, 8.1, 10 (both 32 or 64 bits architecture, where available) - 800x600@256...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    RuSimpleCrypt

    A tool to encrypt files in Russian.

    Инструмент для шифрования файлов на русском языке. Только для операционной системы Windows. Интеграции с контекстным меню проводника нет. AES шифрование 256 бит. Официальная страница http://xn--90abhbolvbbfgb9aje4m.xn--p1ai/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D1%88%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5/rusimplecrypt-%D1%88%D0%B8%D1%84%D1%80%D0%BE%D0%B2%D0%B0%D0%BD%D0%B8%D0%B5-%D1%84%D0%B0%D0%B9%D0%BB%D0%BE%D0%B2.html A tool to encrypt...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Conversor de Bases

    Converte qualquer base para qualquer base.

    Cansado de fazer diversas contas para converter bases? com este pequeno programa, faça conversões de números COM VIRGULA de qualquer base para qualquer base (limite 256).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    jvqa

    Video Quality Assessment in Java

    ... by selecting image structure statistic (variance, gradient, shifted gradient, 2/3/4-component gradient of variance), structure scale (full, downsampled to 256 or multiscaled), pooling window type (Gaussian, Box, Box with downsampling, or unfiltered) and size, index stabilization (logical or by constants) and luminance index (Gaussian, Box, Box with downsampling or no luminance index).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    gruvbox

    gruvbox

    Retro groove color scheme for Vim

    ..., Elixir. The supported plugins are EasyMotion, vim-sneak, Indent Guides, indentLine, Rainbow Parentheses, Airline, Lightline, GitGutter, Signify, ShowMarks, Signature, Syntastic, Ale, CtrlP, Startify, NERDTree, Dirvish, and more. If you're using GUI version of vim that should be enough. By default gruvbox will act as usual 256-color theme, but colors wouldn't be that vivid due to limitations of 256-palette.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22
    Evrak Takip Programı

    Evrak Takip Programı

    Gelen Giden Evrak Takip Programı

    PaperNIC kolay, hızlı ve güvenli bir doküman yönetim ve paylaşım sistemidir. Ayrıntılı bilgi için lütfen www.papernic.com/tr/ adresini ziyaret edin.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23

    AES256 Password manager Russian version

    Simple password manager in Russian

    Simple password manager that uses encryption AES 256. Translated into Russian. AES256 Password Manager (originally Encrypter) decoder is a text file that stores the passwords or other sensitive data is completely secure manner using encryption algorithm AES 256-bit. Official page http://xn--90abhbolvbbfgb9aje4m.xn--p1ai/%D0%B1%D0%B5%D0%B7%D0%BE%D0%BF%D0%B0%D1%81%D0%BD%D0%BE%D1%81%D1%82%D1%8C/%D0%BF%D0%B0%D1%80%D0%BE%D0%BB%D0%B8/aes256-password-manager-%D0%BF%D1%80%D0%BE%D1%81%D1%82%D0%BE%D0...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    jBIBLIOTEKA

    jBIBLIOTEKA

    Java program za vodjenje biblioteke Prirodno-Matematickog fakulteta

    Java program za vodjenje biblioteke Prirodno-Matematickog fakulteta Pristina sa privremenim sedistem u Kosovskoj Mitrovici. Program je kompajliran u .class fajlove unutar jednog JAR fajla, a zatim je enkriptovan 256-bitnim AES kljucem i smesten je u EXE fajl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25

    SSH Client Library for .Net

    Client library utilizing the Secure Shell protocol for .Net

    A free and open source client library utilizing the Secure Shell protocol for connecting to remote systems over a secure connection with the .Net Framework. Includes support for tty, sftp, local port forwarding, remote port forwarding, dynamic port forwarding, and remote execution. Additionally supports the following: Key Exchange: Diffie Hellman Group 1 and Group 14 with SHA1, and Group Exhange with SHA1 or SHA256, Elliptic Curve Diffie Hellman with SHA2 and NIST curves 256, 384, and 521...
    Downloads: 0 This Week
    Last Update:
    See Project