Showing 66 open source projects for "md5 encryption"

View related business solutions
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • RMM Software | Remote Monitoring Platform and Tools Icon
    RMM Software | Remote Monitoring Platform and Tools

    Best-in-class automation, scalability, and single-pane IT management.

    Don’t settle when it comes to managing your clients’ IT infrastructure. Exceed their expectations with ConnectWise RMM, our MSP RMM software that provides proactive tools and NOC services—regardless of device environment. With the number of new vulnerabilities rising each year, smart patching procedures have never been more important. We automatically test and deploy patches when they are viable and restrict patches that are harmful. Get better protection for clients while you spend less time managing endpoints and more time growing your business. It’s tough to locate, afford, and retain quality talent. In fact, 81% of IT leaders say it’s hard to find the recruits they need. Add ConnectWise RMM, NOC services and get the expertise and problem resolution you need to become the advisor your clients demand—without adding headcount.
  • 1
    PHPMailer

    PHPMailer

    The classic email sending library for PHP

    PHPMailer – A full-featured email creation and transfer class for PHP. Support for UTF-8 content and 8bit, base64, binary, and quoted-printable encodings. SMTP authentication with LOGIN, PLAIN, CRAM-MD5, and XOAUTH2 mechanisms over SMTPS and SMTP+STARTTLS transports. Validates email addresses automatically. Many PHP developers need to send email from their code. The only PHP function that supports this directly is mail(). However, it does not provide any assistance for making use of popular...
    Downloads: 198 This Week
    Last Update:
    See Project
  • 2
    Udp2raw-tunnel

    Udp2raw-tunnel

    Turns UDP traffic into encrypted UDP/fakeTCP/ICMP traffic

    ... account or cap_net_raw capability. ICMP/FakeTCP headers help you bypass UDP blocking, UDP QOS or improper UDP NAT behavior on some ISPs. In ICMP header mode,udp2raw works like an ICMP tunnel. UDP headers are also supported. In UDP header mode, it behaves just like a normal UDP tunnel, and you can just make use of the other features (such as encryption, anti-replay, or connection stalization).
    Downloads: 15 This Week
    Last Update:
    See Project
  • 3
    Rclone

    Rclone

    Rsync for cloud storage

    Rclone is a command line program for syncing files and directories to and from various cloud storage providers, including Google Drive, Amazon Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Cloudfiles, Google Cloud Storage, Yandex Files and many more.
    Downloads: 10 This Week
    Last Update:
    See Project
  • 4
    s3fs

    s3fs

    FUSE-based file system backed by Amazon S3

    s3fs allows Linux, macOS, and FreeBSD to mount an S3 bucket via FUSE. s3fs preserves the native object format for files, allowing use of other tools like AWS CLI. Large subset of POSIX including reading/writing files, directories, symlinks, mode, uid/gid, and extended attributes. Compatible with Amazon S3, and other S3-based object stores. Allows random writes and appends, large files via multi-part upload, and renames via server-side copy. User-specified regions, including Amazon GovCloud....
    Downloads: 2 This Week
    Last Update:
    See Project
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 5
    DAR - Disk ARchive

    DAR - Disk ARchive

    For full, incremental, compressed and encrypted backups or archives

    DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located...
    Leader badge
    Downloads: 206 This Week
    Last Update:
    See Project
  • 6
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is a JAVA-based open source EDIINT AS2 solution. Logging- and configuration GUI (SWING), async & sync MDN, signatures, encryption, SSL, web interface, pluggable into any servlet container, TP manager, compression, optional profiles: MA, FN
    Leader badge
    Downloads: 87 This Week
    Last Update:
    See Project
  • 7

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes: Encrypt...
    Leader badge
    Downloads: 7 This Week
    Last Update:
    See Project
  • 8

    OTP-Crypto-Tool

    Symetric file encryption based on OTP implemented as XOR encryption

    OTP (One Time Pad) In case you have any questions, contact me at: crypto-munition@gmx.de When used correctly, the OTP is an information-theoretically secure and demonstrably non-breakable encryption. The encryption process is implemented as symmetrical file encryption based on XOR encryption. The integrated pseudo-random generator serves only to illustrate and check the functionality. The use of this generator for REAL OTPs is not recommended. For REAL OTPs, hardware-based key generators (e.g...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    IRBS - Institutional Registers Backup

    IRBS - Institutional Registers Backup

    Open Source Institutional Registers Backup Syst. for Paper Registers

    If you are looking for a way to backup your numerous paper based registers, i.e. Admissions / Withdrawals, Fees, Attendance & Exam Mark Registers of Schools, Junior / Senior Colleges, then this software will help you. Designed with goals of Simplicity & packaged with all necessary open source tools to get you into action, straightaway. Refer Screenshots Below. Just download the above zip file, extract it to a Disk Partition, with lots of free space & Turn ON Network Discovery By Right...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 10
    Sobbu

    Sobbu

    Encode-Decode Tool weaponized with Hash Encrypt & Hash Cracker

    Sobbu is a cryprography tool with various encode-decode algorithm weaponized with Hash encrypting and Hash cracker via Rainbow Table method. This tool used 4 different hash database to identify hash value. Currently available for Windows (CLI + GUI) and Linux (CLI) Latest version : 1.4 Available Encode-Decode algorithm : - Base32 - Base64 - Binary - Octal - Hex - ASCII - URL - HTML - ROT13 Available Hash encrypting and Hash cracking algorithm : - MD5 - SHA1 - SHA224 - SHA256 - SHA384...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    Generic Hash and HMAC Program

    52 Hash Functions In One Program, plus each with HMAC or KMAC

    Hash and HMAC command line tool for 52 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC support. Starting with V1.3.0, SHA3 is fully supported: sha3-224, sha3-256, sha3-384, sha3-512, and extendable output functions (XOFs) shake128, shake256 V1.4.2 supports KMAC (a stronger alternative to HMAC) for the SHA3 family, Base64 output for shake*. shake...
    Leader badge
    Downloads: 10 This Week
    Last Update:
    See Project
  • 13
    Xoil Sync

    Xoil Sync

    Xoil Sync allows for you to queue files for up/downloading in folders!

    ... base, which is compressed and use AES encryption over the transit lane as well as SSL (DES Cipher) and will rebuild the folder path you have stored online with the *.xoil file you have generated which is essentially a certificate much like a CSR Certificate for generating an SSL Certificate the XOIL Syncator Certificate 1.xx is what is contained within the *.xoil file essentially being a text file and embedded certificate, there is a short key too retrieve the certificate which will privately ~
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Universal Encoder Decoder - AyaN Softwar

    Universal Encoder Decoder - AyaN Softwar

    84 Type Encoding/Decoding Options And Full Offline - AyaN Software

    ... to use, just one click and it will start. There is no difficulties of installing process and system agreement. With the use of this software you can encode and decode a lots of variations. for example, you can encode and decode 64 BASE data, URL, HTML, JavaScript, ROT 13, you can convert text to binary, and vice versa, hex to ASCII, decimal to binary, hex, octal, and you can also generate MD4, MD5, SHA1 and SHA245 hashe etc.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 15
    Arrow-linux-iso

    Arrow-linux-iso

    Arch the easy way. Choose betwen an installer, or an easy walk thru

    .... With all the bragging rights you want. As well as access to over 100,000 free programs using AUR (Arch User Repositories). Welcome Home. Welcome To Arrow-Linux. Don't forget to checksum md5sum /file/location/Arrow-X-525.iso the md5 checksum for (525) = 8ba2095e0166002f7c10527b47c04c00 sha1sum /file/location/Arrow-X-525.iso the sha1 checksum for (525)= d28fe695ae74f9e49bad4e3a12113c2d2e66ef13
    Downloads: 1 This Week
    Last Update:
    See Project
  • 16

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify the checksums: digest...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    TrapGate FTN Mailer

    TrapGate FTN Mailer

    Trapgate FTN Mailer

    Trapgate can be used in many ways for example for Fidonet but also for general transfers. Included as FTP server, SMTP server or POP server. As HTTP web extention and more. Trapgate was first a echo/netmail exchange mailer with small files now you can send and receive files from huge size and connect it to a newsgroup, usenet, use email and echomail/netmail or mix them, use a gateway from echo/netmail to newsgroups etc. The look (skin) has be changed and it shows filesizes in Bytes, KB, MB,...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    RSAREF

    RSAREF

    RSAREF(TM): A Cryptographic Toolkit

    This is the ancient and highly depreciated RSA refrence code.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    MD5 Encryptor

    MD5 Encryptor

    MD5 Encryptor

    MD5 Encryptor
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Shaget

    An application for getting SHA and MD5 checksums from an file.

    Shaget is an application made in C# for getting SHA (SHA1, SHA256 and SHA512) and MD5 sums from an file. You can verify if the sums are correct and save the full log to an text file. This application does not encrypt or decrypt files.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21

    SSH Client Library for .Net

    Client library utilizing the Secure Shell protocol for .Net

    ... Encryption: AES128, 192, and 256, and TripleDES in Counter or CBC mode, Cast128 and Blowfish in CBC mode, and TripleDES in EBC mode Authentication: Password, PublicKey (OpenSSH DSS, RSA, and ECDSA, PuTTy DSS, and RSA) Message Authentication: HMAC using SHA256, 384, and 512, SHA1, RipeMD160, MD5, MD5-96, and SHA1-96.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    ... operating system; 4, support MAC OS Apple operating system 5, support for MD5, SHA1, SHA256, SHA384, SHA512, CRC32, Alder32 encryption verifi
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text & Digits) ROT47 ----- Text...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 6 This Week
    Last Update:
    See Project
  • 25

    Monastic University

    Software for managing Admissions, Withdrawals, Marks in Monastic Inst.

    This software will help in the management of Admissions / Withdrawals of Staffs & Students & also processing of Exam Marks of all Monastic Universities. Designed with goals of Simplicity & packaged with all necessary open source tools to get you into action, straightaway. Just download the file given above, then double click to extract it to a Disk Partition, with lots of free space, & then right-click files with names starting with 1 to 8 to run them as administrator, to install the...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next