Showing 32 open source projects for "hash compare"

View related business solutions
  • SKUDONET Open Source Load Balancer Icon
    SKUDONET Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
  • All-in-One Payroll and HR Platform Icon
    All-in-One Payroll and HR Platform

    For small and mid-sized businesses that need a comprehensive payroll and HR solution with personalized support

    We design our technology to make workforce management easier. APS offers core HR, payroll, benefits administration, attendance, recruiting, employee onboarding, and more.
  • 1

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    This project offers an Excel spreadsheet, available for download through the Files tab (above). The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the files...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hash Latch
    ... you the actual key, it gives you a safe containing the key. This approach allows the hash latch to protect itself from forged keys and also enables you to put the same key into multiple safes without the recipients of these safes knowing they have the same key (even if they compare their ciphertexts). Moreover, the hash latch verifies the integrity of a key after decrypting it (just in case). You can read the tutorial about it on Instructables: https://www.instructables.com/Hash-Latch/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    With this tool you are able to test different hashes: - MD2 - MD5 - SHA1 - SHA224 - SHA256 - SHA384 - SHA512 Recommended Java 8 For any questions you may use the ticketing system .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JChecksum

    JChecksum

    MD5 Checksum Tool

    This tool checks the integrity of files. It is very important if you don’t want your computer to get infected with viruses and malware. Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files. This tool enables you to verify the file integrity of the downloaded...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Control remote support software for remote workers and IT teams Icon
    Control remote support software for remote workers and IT teams

    Raise the bar for remote support and reduce customer downtime.

    ConnectWise ScreenConnect, formerly ConnectWise Control, is a remote support solution for Managed Service Providers (MSP), Value Added Resellers (VAR), internal IT teams, and managed security providers. Fast, reliable, secure, and simple to use, ConnectWise ScreenConnect helps businesses solve their customers' issues faster from any location. The platform features remote support, remote access, remote meeting, customization, and integrations with leading business tools.
  • 5

    dotNet File Hash

    An implementation of various hashing algorithms in C# 4.0

    This is a C# .Net 4.0 file hashing Windows application that implements a variety of hashing algorithms (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD160) readily available in the System.Security.Cryptography section of the .Net framework and can be used to compare files from various folders for true file duplications by directly hashing the content and ignoring other extended details. The application UI is pretty crude, but the underlying code is quite lean. As always, this application...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CoSA (Concurrent Subtractive assembly) is a package to detect differential short sequencing reads by comparing two groups of metagenomes on the basis of kmer frequencies. KMC 2 is one of the fastest k-mer counting implementations, so we employ KMC 2 for k-mer counting in our package. Because in many cases we need to compare tens of or even hundreds of samples, we adopt the concurrent hash table in Libcuckoo for efficient k-mer counting. Once the differential reads are extracted, they can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    iFile Compare

    A simple file comparison tool

    A file comparison tool used to compare the name, size and md5 hash of files. Good for massive file movements to the cloud and verifying file integrity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Small application which can help you to verify hashes and if your files from internet weren't broken. Supported hashes: CRC32, sha1 - sha512. Platform: .NET, Mono. Windows Shell integration. Can compare to hash in clipboard. Color highlighting.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9

    Bellator-Integrity

    Check the file integrity

    Check the file integrity using SHA hash algorithms. It has two modes: - MakeHash: Create a signature hash of the files - CompareHash: Compare the signature hash of the files with the current signature hash to detect changes in them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Manage your IT department more effectively Icon
    Manage your IT department more effectively

    Streamline your business from end to end with ConnectWise PSA

    ConnectWise PSA (formerly Manage) allows you to stop working in separate systems, and helps you build a more profitable business. No more duplicate data entries, inefficient employees, manual invoices, and the inability to accurately track client service issues. Get a behind the scenes look into the award-winning PSA that automates processes for each area of business: sales, help desk, support, finance, and HR.
  • 10
    WinMd5Checksum

    WinMd5Checksum

    Calculating and comparing MD5 checksums, calculating SHA256 hash

    You can calculating md5 hashsums, comparing files and hashsums in pairs. If you have backups of one file and you have a md5 hashsum, you can compare your backups against this md5 hashsum. Calculating SHA256 hashes too. This repository will no longer updated! Please take a look at this url: https://github.com/tualatin/winmd5checksum
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    md5compare

    Compares 32 character MD5 hashes

    This is a simple bash script that compares 32 character md5 hashes using string compare. It requires at least one argument and can take up to two. In the case of a single argument it will assume the string provided is an md5 hash and compare it against all of the files in the present working directory. The second argument can be used to specify a directory to compare against all of the files or be used to specify an individual file to use. This project was created to satisfy my need...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    qlsdup

    GUI based lightweight duplicate file finder / remover.

    ... for large file sets with few differences: basic set of duplicate candidates is determined by file size, then candidates are compared byte-wise. So for files which don't start to differ by growing at the tail it reduces read operations greatly compared to hash-based comparision (i.e. test case: 40GB of files, 16GB RAM, many differences: initial compare (uncached by OS) around 300sec, subsequent compare (relevant file parts cached by OS) ca. 2sec) Note: this program is not related to lsdup
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Hash Monster
    A versatile gui and console application capable of generating and comparing hashes using a variety of popular hashing libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    chksm-chkfile

    chksm-chkfile

    Windows MD5/SHA-1/SHA-256 file hashes calculator.

    Calculate MD5, SHA-1, SHA-256 checksum hashes from a specific file, and compare these values with a given string. Accept one filename as parameter. Functionalities : - automatically retrieve text from Windows clipboard and compare it. - 32 & 64 bits windows platforms supported - Installation (Add to file context menu) - Uninstallation Requirements: - Microsfot .NET Framework 2.0 Files: chksm-chkfile.exe MD5: c0b7761deeb7d7dc45aa04726309d4ca SHA1: b19e8013ce1ea6c297c682a9ad5940024f8ff68e...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Quick Check

    Quick Check

    Quick Check is a small MD5 comparison program.

    Quick Check is a small MD5 comparison program, that uses a class provided by "IranianExperts". At this point in the project it just compares MD5 however in the future it might support SHA1 and others. When you first open the program you are greeted with a small form that contains two text boxes and one button. First you enter the hash of the file you got from where you downloaded, next click the button and browse to the downloaded file and the program will retrieve the MD5 hash and compare...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    AllCheckSumer

    AllCheckSumer

    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 14 This Week
    Last Update:
    See Project
  • 18
    enviroHash

    enviroHash

    A network utility to MD5 hash and catalog a running file system.

    enviroHash is a network utility designed to be executed standalone or through remote management software. It uses fsum by Slavasoft to hash all accessible files within a scope that is defined through command line arguments. Uppon completion enviroHash will generate a .txt output file that contains a "hash","filename" pair delimited by commas. This file can then be imported into the enviroHashBrowser so that System Administrators can search a host or all hosts for particular filename or hash...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Advance MD5 Checksum

    Advance MD5 Checksum

    This software allows users to generate the MD5 and SHA Hash Checksum.

    ... and file size. Other features are: compare a file with an MD5 hash and compare two files to know if files are different or equal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    CSBackup

    Commandline Backup with hardlinks, excellent memory saving strategy

    CSBackup is a Backup software build in C#. It uses NTFS hardlinks to save Harddisc place and create a backup history. One of the main features is the support of long file names (more than 255 characters) and UTF-8 support. * Use of Aliases for folders * Backup complete drives from the root * Compare file changes by size and date (faster than hash-codes) * Different log levels * Delete Strategy: strategic configuration to configure which backup folders to keep (e.G. 7 daily, 4 weekly, 12...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    DirComparator is used to compare contents of two folders.It checks for file existence, size, modification date and hash (SHA1).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A console application to find duplicated files in your hard disk that allows you to choose which duplicated files delete. It will work with a DB to store information of your files and compare them using a hash code like md5. Wait! I am still working
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A file hash generator. Generates MD5, SHA-1, SHA-256 and SHA-512 hashes for the selected file. Can choose any combination of the 4 hashes. Simple, Small and fast. Works great on ISO's and any other files. I might add in ability to compare hashes to
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A Java Programm to sort JPEG-Images from digital still image cameras. The sorting is done by the capture date/time of the EXIF-Header. Image meta informations from EXIF-Header is stored in a database. Double files will be recognized by MD5-hash compare.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    mwsync tries to be faster then rsync on very low speed target devices by using a local hash file for compare (thus avoiding the remote compare on each run).
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next