Showing 74 open source projects for "sha 512"

View related business solutions
  • Employee monitoring software with screenshots Icon
    Employee monitoring software with screenshots

    Clear visibility and insights into how employees work. Even remotely

    Our computer monitoring software allows employees, field contractors, and freelancers to manually clock in when they begin working on an assignment. The application will take screenshots randomly or at set intervals, which allows employers to observe the work process. The application only tracks activity when the employee is clocked in. No spying, only transparency.
  • Case Management Software for Social Services Icon
    Case Management Software for Social Services

    For human services organizations looking for case management software

    Collaborate is customizable case management software for non-profits and social services agencies with teams of 5+ staff.
  • 1
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is a JAVA-based open source EDIINT AS2 solution. Logging- and configuration GUI (SWING), async & sync MDN, signatures, encryption, SSL, web interface, pluggable into any servlet container, TP manager, compression, optional profiles: MA, FN
    Leader badge
    Downloads: 205 This Week
    Last Update:
    See Project
  • 2
    NanaZip

    NanaZip

    The 7-Zip derivative intended for the modern Windows experience

    NanaZip is an open source file archiver intended for the modern Windows experience, forked from the source code of well-known open source file archiver 7-Zip.
    Leader badge
    Downloads: 385 This Week
    Last Update:
    See Project
  • 3
    FileVerifier++
    FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
    Downloads: 115 This Week
    Last Update:
    See Project
  • 4
    mendelson OFTP2

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, SSL, certificate exchange, message routing, mail notification
    Leader badge
    Downloads: 31 This Week
    Last Update:
    See Project
  • Visitor Management and Staff Sign In | Sign In App Icon
    Visitor Management and Staff Sign In | Sign In App

    Sign In App is a modern, enjoyable way to sign in visitors and staff, and book desks and meeting rooms.

    Our visitor management system streamlines registration, check-in, and authorization processes, while our facility management tools streamline room booking, resource allocation, and asset management. We prioritize security with our advanced risk mitigation measures, including health and safety protocols, emergency messaging, and robust analytics for thorough auditing.
  • 5
    Win32 and Win64 dll to compute very fast the checksum of strings or files using RSP32 , Adler32 , CRC32 , MD5 , SHA-1 , SHA-256 , MD5_32 , SHA-512 and RIPEMD160
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    StringHash

    StringHash

    Open Source Commandline String Hasher written in AutoIt3

    String Hash Tool - ALBANESE Research Lab © 2018-2019 Usage: StringHash.exe --str <string> --alg <algorithm> Algorithms: MD2, MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512 Example: StringHash.exe --str MyString001 (Default MD5) StringHash.exe --str "MyString 002" --alg sha-256 Copyright © 2018-2019 Pedro F. Albanese Source: https://github.com/pedroalbanese/stringhash Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    EasyHash

    EasyHash

    HASH value generator

    EasyHash is a HASH value generator that is very easy to use and at the same time very efficient. Furthermore, the execution speed of the processes is very fast. The user interface is nice, very intuitive and offers multiple methods for importing files. In addition to this, it allows for rapid text entry, making it incredibly easy to use and adaptable to any circumstance of use. EasyHash is an indispensable tool for anyone who works with large amounts of files.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 8
    xSum Hash Utility

    xSum Hash Utility

    Command-line utility for Windows which generates and verifies the hash

    .... Users can easily verify that your release is authentic and belongs to you by verifying both the file hashes, and the GPG key. Files that have been tampered with will return a warning to the user. Supported Algorithms: - CRC-8, 16, 32 - MD5 - SHA1 - SHA2-256, 384, 512 - SHA3-128, 224, 256, 384, 512 - Blake2b-128, 160, 256, 384, 512 - Blake2s-128, 160, 256, 384, 512 For a full explanation of using xSum, read https://github.com/Aetherinox/xsum-hash-utility/wiki/Getting-Started
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Win32 and Win64 dll to compute very fast the checksum of strings or files using RSP32 , Adler32 , CRC32 , MD5 , SHA-1 , SHA-256 , MD5_32 , SHA-512, RIPEMD160 and now (march/2024) the fast new checksum ds32, it is in the file rsp32.c
    Downloads: 0 This Week
    Last Update:
    See Project
  • Let your volunteer coordinators do their best work. Icon
    Let your volunteer coordinators do their best work.

    For non-profit organizations requiring a software solution to keep track of volunteers

    Stop messing with tools that aren’t designed to amplify volunteer programs. With VolunteerMatters, it’s a delight to manage everything in one place.
  • 10
    Bootleg AES-256 CBC File Encrypter

    Bootleg AES-256 CBC File Encrypter

    A simple file encryption software that utilizes the AES-256 CBC

    A simple file encrypter written in C/C++. Tested sucessfully with 0.5 GB file. Despite having well-functioning cryptographic features, it may not be reliable. This application is provided with no warranty or guarantees of any kind. Use it at your own risk! Source code is available at: https://github.com/Northstrix/Bootleg-AES-256-CBC-File-Encrypter Made with the help of Perplexity Similar...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 11
    The program allows you to generate the hashes with the chosen algorithm (MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512) of a single file or an entire folder (you can choose to scan the folder recursively or not recursively). It supports drag and drop of files and folders. The hash can be exported to text files. Compiled with openjdk 8. Usage: param 1: exclude symbolic links (0 or 1) [mandatory], param 2: exclude hidden files (0 or 1) [mandatory], param 3: folders to exclude [optional...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    ECDSA File Signer

    ECDSA File Signer

    A simple app that enables you to sign the files using ECDSA and SHA512

    A simple app that enables you to sign the files and verify their integrity/authenticity using the ECDSA and SHA-512. I originally developed this app for my university course, but I also decided to post it on GitHub on Sourceforge. This application is made for educational purposes only. Despite having well-functioning cryptographic features, it may not be reliable. This application is provided with no warranty or guarantees of any kind. Use it at your own risk! Made with the help...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Midbar Firebase Edition

    Midbar Firebase Edition

    Midbar Firebase Edition stores data in the cloud, keeps keys on device

    Midbar Firebase Edition - is the edition of Midbar that stores the encrypted data in the cloud while keeping the cryptographic keys on the device! It comes with the firmware for the hardware IoT data vault and the desktop app that's synced with the vault via the Google Firebase. A vault and an app can be used without one another. The GitHub repository is available at github.com/Northstrix/Midbar-Firebase-Edition Tutorial for...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    PyCheck

    PyCheck

    Calculates the checksum of a file, and compares it to an original.

    PyCheck calculates the checksum of a file, and compares it to an original either by selecting an original copy of the file, or manually entering the checksum of the original file, such as when it is provided on a website from which you downloaded a file. In Linux this program depends on the Python3 TK package, so make sure you have python3-tk installed using your distribution's package manager before continuing. I digitally sign some files in my releases. If you'd like to verify those...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    ARITA

    ARITA

    Extraordinary audio player for FreeBSD & GNU/Linux

    Unlike conventional audio players, ARITA aims to help music lovers to keep their precious collections well organized and tidy. Therefore it takes a different approach to arranging audio files. They must be emplaced into libraries: 'archives' or 'cuesheets'. Archive - compressionless container like CPIO. Instead of tags for description of tracks, a plain XML/YAML file is placed alongside each archive. Rather than embedding cover art in every track, put a single image next to a library. TIFF...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    fileaxy

    fileaxy

    Fileaxy does file sync, de-duplication, image matching & bulk preview

    Fileaxy is a file de-duplication, organization, synchronization, and bulk previewing tool which utilizes a new user interface for local file management. Using content hashing or machine vision algorithms, Fileaxy can detect identical files as well as similar names, images, videos, or fonts and correlate those to others based on naming conventions. Optionally integrates with ImageMagick, GraphicsMagick, FFmpeg, and Mac Sips file decoding with a simple button click. Fileaxy opens NO network...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    tcl-sha

    SHA utilities for Tcl

    A Tcl loadable module to do SHA hashes. Compiles as SHA-512, SHA-384, SHA-512/256, SHA-512/224 or compiles as SHA-256, SHA-224.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    wxChecksums

    wxChecksums

    A program which calculates and verifies checksums.

    wxChecksums is a program which calculates and verifies checksums. wxChecksums is able to read and write files in SFV and MD5 format. It is available for Windows 2000/XP and Linux.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 19
    HashCLI

    HashCLI

    Open Source Commandline Recursive Hasher written in AutoIt3

    Hash Digest Tool - ALBANESE Lab © 2018-2020 Algorithms: MD2, MD4, MD5, SHA1, SHA-256, SHA-384, SHA-512 Copyright © 2018-2020 Pedro Albanese Source: https://github.com/pedroalbanese/hashcli Visit: http://albanese.atwebpages.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 21

    Checksum Util

    A unix like CLI checksum utility ported for WindowsNT.

    Available Hashes: 1. MD5 (md5sum) 1. SHA-1 (sha1sum) 2. SHA-256 (sha256sum) 3. SHA-512 (sha512sum) Installation: Download latest Windows zip release from here. Extract the zip file. Then right-click 'install.bat' and Run as Administrator. Usage: In CMD / PowerShell: C:\Users\User Name> sha1sum path/to/file.psd
    Downloads: 6 This Week
    Last Update:
    See Project
  • 22
    File Info

    File Info

    A software that gives you information about your file(s)

    File Info is software that gives you information about your file(s) like CRC32, MD5, SHA-1, SHA-256, SHA-384, SHA-512, and other file info. It let you find the hashes and also verify any of them. Also you can export the results to a text file. Needs .NET 4.6 or newer to run. Works on Windows 7 (86/64), 8 (86/64), 8.1 (86/64), 10 (86/64) Version 0.6.3.5 [16/12/2018] 1. Fixed: Opening File Info with ‘On top’ selected does not make the form on top.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 23
    Manifest Maker

    Manifest Maker

    NO LONGER MAINTAINED

    NO LONGER MAINTAINED, NO LONGER SUPPORTED Manifest Maker is a graphical Python application which takes a file or group of files and creates a plain text manifest list of each item. The manifest includes the file name (including directory structure) as well as a checksum of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    iTelliHashExcel

    iTelliHashExcel

    Cryptographic Hashing Application for Excel Files

    iTelliHashExcel is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next