Showing 30 open source projects for "hash generator aes 256"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • $300 in Free Credit Towards Top Cloud Services Icon
    $300 in Free Credit Towards Top Cloud Services

    Build VMs, containers, AI, databases, storage—all in one place.

    Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
    Get Started
  • 1
    Speedcrypt File Encryption

    Speedcrypt File Encryption

    A File Encryptor with many Options and Powerful Algorithms!

    Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is a free program for encrypt the files which helps you to manage in a secure way. The files are encrypted using the best and most Secure Encryption algorithms currently known: AES-GCM, AES RIJNDAEL, PGP, AES (String Crypto 256 Bit Key) SERPENT, CHACHA20, XCHACHA20-POLY1305. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Crypt Tool

    Crypt Tool

    A simple password manager for Windows based on OpenSSL

    A simple password manager for Windows based on OpenSSL (included). Allow encryption, decryption of messages, passwords, files and images with AES 256 CBC algorithm. Integrated FTP(S) client. Console based commands, random password generator. Stand alone application need no installer, runable from USB sticks. Working with Windows 7-11 (OpenSSL 1.1.1s 32 Bit) Read Wiki for more details.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 3

    comfymodeldownloader

    Automate ComfyUI model downloads via URL or name into correct folders

    ComfyUI Model Downloader is the ultimate automation tool for AI artists. Tired of hunting down missing checkpoints, LoRAs, VAEs, or ControlNets? Simply drag and drop a ComfyUI workflow (JSON or PNG) into the app. It instantly identifies missing models and uses Gemini AI to track down direct download links on Hugging Face and Civitai. 🚀 Why use it? Stay in the Flow: Say goodbye to frustrating "Missing Node" errors. Intelligent AI Scouting: Gemini AI finds obscure or renamed models by...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    KeePass

    KeePass

    A lightweight and easy-to-use password manager

    KeePass Password Safe is a free, open source, lightweight, and easy-to-use password manager for Windows, Linux and Mac OS X, with ports for Android, iPhone/iPad and other mobile devices. With so many passwords to remember and the need to vary passwords to protect your valuable data, it’s nice to have KeePass to manage your passwords in a secure way. KeePass puts all your passwords in a highly encrypted database and locks them with one master key or a key file. As a result, you only have to...
    Leader badge
    Downloads: 282,902 This Week
    Last Update:
    See Project
  • Go From AI Idea to AI App Fast Icon
    Go From AI Idea to AI App Fast

    One platform to build, fine-tune, and deploy ML models. No MLOps team required.

    Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
    Try Free
  • 5
    EasyHash

    EasyHash

    HASH value generator

    EasyHash is a HASH value generator that is very easy to use and at the same time very efficient. Furthermore, the execution speed of the processes is very fast. The user interface is nice, very intuitive and offers multiple methods for importing files. In addition to this, it allows for rapid text entry, making it incredibly easy to use and adaptable to any circumstance of use. EasyHash is an indispensable tool for anyone who works with large amounts of files.
    Downloads: 11 This Week
    Last Update:
    See Project
  • 6
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon secures data in untrusted off-site storage through a layered approach: files are compressed, then AES-256 encrypted with a randomly generated 128-character passphrase yielding approximately 762 bits of entropy — far beyond the reach of both classical and quantum brute-force attacks. The ciphertext is obfuscated by prepending and appending random byte blocks, making the result unidentifiable as an encrypted file. The payload is then sharded into one private chunk — holding the encryption key and part of the data — and multiple equal-sized public chunks, each renamed to its SHA-512 hash and given a uniform timestamp to prevent metadata inference. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    FluxKey

    FluxKey

    Simple Encrypted Password Generator

    ━━━━━━━━━━━━━━━━━━━━━━━━━━━━ Welcome to the Official FluxKey Sourceforge — home of the sleek, local-first password manager built for people who actually care about their security. No cloud. No subscriptions. No data leaving your machine. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━ ✦ WHAT IS FLUXKEY? FluxKey is a fully encrypted, offline password manager built with Python. Your vault lives on your device, protected by a master password — and it looks incredible doing it. ⚡ Powerful password generator...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    ProxyCrypt

    Encrypted volumes through command line

    ProxyCrypt is a command line tool that creates encrypted volumes within a file or a hard drive. Encryption and decryption are made on the fly, allowing you to use encrypted volumes like normal ones. Designed for paranoids and advanced users, it is also fast, very lightweight, open source and easy to recompile. See the features below. It works as a "proxy" for the AIM driver or the ImDisk driver. AIM driver is included in the full package. See the documentation for more informations...
    Downloads: 23 This Week
    Last Update:
    See Project
  • 9
    SafeNotes - Encrypted Journaling

    SafeNotes - Encrypted Journaling

    SafeNotes - A encrypted and easy-to-use journaling application

    SafeNotes is an encrypted and user-friendly note-taking application designed to keep your personal notes and journal entries safe and organized. With SafeNotes, you can easily create, edit, and manage your notes, all while ensuring your data is protected through robust AES-256 encryption and password hashing. The app features a sleek and intuitive interface built with MaterialSkin, offering light and dark themes to suit your preferences. SafeNotes is perfect for anyone looking to keep...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Forever Free Full-Stack Observability | Grafana Cloud Icon
    Forever Free Full-Stack Observability | Grafana Cloud

    Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.

    Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
    Create free account
  • 10
    Leashmore

    Leashmore

    Leashmore is an open-source Operations Management Software

    Leashmore is an open-source "Operations Management Software" distributed under the MIT License. It employs military-grade encryption alongside sophisticated integrity verification feature to ensure data security. You can freely modify and distribute copies and any modifications of the Leashmore. You can use Leashmore in commercial applications. GitHub page with the source code and the user guide can be found at https://github.com/Northstrix/Leashmore Leashmore requires .NET 6.0...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 12
    KeyHolder password manager

    KeyHolder password manager

    Store your passwords in an offline encrypted file!

    Need a JDK to run, download it here: https://www.oracle.com/java/technologies/downloads/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Devault

    Devault

    Decentralized alternative to proprietary and centralized cloud storage

    A Blockchain-based, self-hosted, and end-to-end encrypted cloud storage. Devault is a decentralized, self-hosted, and end-to-end encrypted alternative to proprietary and centralized cloud storage. The file gets encrypted using AES-256-CBC encryption. The encrypted file is split into pieces. The chunks are distributed across the network nodes. The root hash will be stored in your wallet on the blockchain.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    ...SJCL is small but powerful. The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes. Just as importantly, the default parameters are sensible: SJCL strengthens your passwords by a factor of 1000 and salts them to protect against rainbow tables, and it authenticates every message it sends to prevent it from being modified. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Space International SHIKA Crypto-suite

    Space International SHIKA Crypto-suite

    High-grade military diplomatics-grade cryptography suite

    ...Designed by Ann Space, Chiko Space and Mika Space, senators of the Most High Senate of Space International, and military generals of the special division of the Infinite Military of Space International (Navy). Better than Serpent, Twofish and AES ciphers. Fully unbreakable. Reasonable performance for the assured ultra high-grade security. Approved by Space International senates and top militaries. At least 512-bits security. The market's offer is only 128 to 256 bits security.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CryptBench

    CryptBench

    A Benchmark which tests CPU cryptography performance

    ...Cryptopp 4. Lib-Gcrypt 5. Libcpuid Minimum requirements to run benchmark: CryptBench requires a CPU with atleast SSE2 support and 64-bit OS. Following Cipher/Hash Functions are used to generate a final CryptScore for the given CPU: 1. AES-256 2. Blowfish 3. Camellia-256 4. IDEA 5. Chacha20 6. SHA-512 7. SHA3-512(Keccack) 8. MD5 9. Blake2b 10. Whirlpool By default the application uses a buffer size of 256MiB and each test runs for 2 secs(per library test). CryptBench uses Libcpuid for CPU info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    CyberCrypt

    .NET Library for Encryption/Decryption

    CyberCrypt: ----------------- .NET Library for Encryption/Decryption Usage: ---------- Encrypting file using AES (256 bits): CyberCrypt._AES256.EncryptFile("C:\example.txt", "YourPassword") Decrypting file using AES (256 bits): CyberCrypt._AES256.DecryptFile("C:\example.txt", "YourPassword") Hashing string using SHA512: CyberCrypt._SHA.SHA512Hash("A string that will be converted to SHA512 hash.")
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Hash

    Hash

    Hash: File Checksum Generator

    Hash is fast and simple java utility program for calculating and verifying checksums for files and text. Hash can generate MD5, SHA-1, SHA-256, SHA-384 and SHA-512 checksum values.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 19
    jPass - Cross-Platform Password Manager

    jPass - Cross-Platform Password Manager

    Compiled into a single .jar file. Tiny Password Manager. Portable

    I did not see a pre-built version of this software on the original developers Github project (https://github.com/gaborbata/jpass), so I am taking it upon myself to compile the releases as they come, so that others don't have to. --Description-- JPass is a simple, small, portable password manager application with strong encryption. It allows you to store user names, passwords, URLs and generic notes in an encrypted file protected by one master password. I will not add the source...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    PwdManager

    PwdManager

    Password manager is a software that helps a user organize passwords.

    Password manager is a software that helps a user organize passwords. PwdManager is a free, open source password manager for home users. Good password management is essential to stay safe, on and offline. These days, services and programs are so many and varied that keeping track of your passwords across devices, websites and apps can be near-on impossible. That's where a password manager like PwdManager comes into play.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 21
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    phpPassSafe
    phpPassSafe is a web based Tool for secure, rolebased password storage and management. The passwords are stored aes-256 encrypted. Now a random password generator is included.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    QPass password manager
    QPass is easy to use, open source password manager application with built-in password generator. You can store in it's database such data as passwords and logins which will be encrypted using AES-256 with PBKDF2(number of iterations set by user). Each entry can include additional information about entry such as name, url adress and description.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 24
    Arcanum Editor
    The Arcanum Editor is a small but powerful tool to encrypt and decrypt messages. The program also comes with it's own format CTXT. This format is based on XML and allows you to save texts with the Advanced Encryption Standard.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    This software generate hashes from a text. It could generate: - MD5 - SHA-1 - SHA 256 - SHA-384 - SHA-512
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB