31 programs for "hash sha" with 1 filter applied:

  • Save 80% of payment processing time with our powerful and easy to use AP automation software. Icon
    Save 80% of payment processing time with our powerful and easy to use AP automation software.

    For companies wanting a platform that helps save payment processing time

    Our platform was designed to address the specific challenges associated with international contractor, freelancer and vendor payments. Setup and user onboarding can be completed in less than an hour (compared to weeks or months). Quantifiable ROI is achieved immediately from reduced transition costs and automation time saving (compared to months or years). Automation significantly reduces the risk of errors and fraud. The software can automatically validate invoices and compare them to contracts and work hours reports, ensuring that the amount charged is accurate. Additionally, the software can enforce approval workflows and segregate duties, reducing the risk of fraudulent activities.
  • Trusted by thousands of websites for website monitoring. Icon
    Trusted by thousands of websites for website monitoring.

    For SREs, IT/DevOps Managers, System Admins, Directors/VPs of Engineering, CTOs

    We provide peace of mind to thousands of customers like Apple, Microsoft, IBM, Palo Alto Networks, Kraft, and BNP Paribas who trust us to monitor the performance, health, and downtime of their websites, applications, and infrastructure.
  • 1

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes...
    Leader badge
    Downloads: 8 This Week
    Last Update:
    See Project
  • 2
    jDiskMark

    jDiskMark

    Java Disk Benchmark Utility

    ...://sourceforge.net/projects/jdiskmark/files/jDiskMark-0.5.1.msi/download Verify your download with SHA-256 Hash: D8EE4181D42B0CEF4806BF903EE9EF44722DB54C6C7F9EEBAC8BE119BB7AF753 Instructions to verify file SHA-256 signature: https://sourceforge.net/p/jdiskmark/wiki/%20Verifying%20SHA-256%20Hash%20on%20Windows%20with%20PowerShell/ ZIP releases: * v0.5-v0.5.1 requires Java 21 * v0.1-v0.4 requires Java 8 NOTE: run as administrator or w sudo to automatically drop disk cache
    Downloads: 23 This Week
    Last Update:
    See Project
  • 3
    Manifest Maker

    Manifest Maker

    NO LONGER MAINTAINED

    NO LONGER MAINTAINED, NO LONGER SUPPORTED Manifest Maker is a graphical Python application which takes a file or group of files and creates a plain text manifest list of each item. The manifest includes the file name (including directory structure) as well as a checksum of the file.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    MySuiteA

    This is not NSA Suite B. This is MySuiteA!

    MySuiteA is a cryptographic suite consisting of symmetric ciphers and hash algorithms, as well as two proof-of-concept quantum-safe asymmetric cryptographic algorithms for digital signature and key agreement. This suite implements: AES-128, AES-192, AES-256, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, NEWHOPE, REBLISS-512A, (and the self-devised)REBLISS-1024A, among a few other things...
    Downloads: 0 This Week
    Last Update:
    See Project
  • ID Verification, Biometric Authentication & Age Verification Technology. Icon
    ID Verification, Biometric Authentication & Age Verification Technology.

    Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution.

    Banks, financial services, insurance and e-commerce organisations that have a need to prove the identity of their customers, users or employees when onboarding, new account opening, age verification or biometric authentication.
  • 5
    QDAC3.0

    QDAC3.0

    QDAC 3.0 is a VCL & FMX data access component

    [IMPORTANT NOTICE] This project is moved to my self website.The new SVN urls : svn://www.qdac.cc/QDAC3 GIT url is: git://www.qdac.cc/QDAC3.git Please check out with the new urls. QDAC 3.0 is a new version of Quick Data Access Component.Compare with version 2,the new version is base on XE6 and support all OS with XE6:Win32/Win64/Mac OSX/iOS/Andriod. QDAC 3.0 Include follow sub components: QXml/QJson/QLog/QWorker/QSort/QExp/QDB etc. QDAC now is in progress. Follow is from QDAC...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    NosRegister

    NosRegister

    NosRegister | WebPage

    NosRegister its an register page with server status check, developed in html, php and javascript + AJAX
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Checksum Directory

    Checksum Directory

    Check some checksum!

    A secure and centralized way to get checksums of common downloads. You will find the usual MD5 hash, but also the newer and more secure hashes like SHA-1, SHA-256 and even SHA-512. If the filesize and all up to four hashes match, you should be save to use that downloaded file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    ... to efficiently cipher text of arbitrary length or files of any size or type. Use it with confidence. To achieve complete one-on-one privacy, SES traverses several levels en route to its output. The more words in your key-phrase, the more layers of encipherment SES applies. It is part Vigenere, part onetime pad, part cryptographic hash, not to mention the essential scrambler element, each component driven by ISAAC, with all key-derivation and stretching relying on Keccak in 512-bit configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rezku Point of Sale Icon
    Rezku Point of Sale

    Designed for Real-World Restaurant Operations

    Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
  • 10
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11
    This tool can create XAdES (XML) signatures based upon ETSI TS 101 903 v1.3.2 standard. It also includes handling of ITU-T X.509 certificates and RFC 3161 timestamps.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 12
    PasswordGenerator

    PasswordGenerator

    A free Password Generator written in Java

    next version is 2.4.6
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13
    J! Secure Password Hashes
    J! Secure Password Hashes provided an easy access to all Joomla! password hash algorithms and the Drupal 7 SHA-512 hashing algorithm. Compatible: Joomla! 2.5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Files Hash code Verifier

    Files Hash code Verifier

    A tool to verify and generate MD5,SHA,CRC32 hash of multiple files

    A Security tool that will help to verify the hash codes of files . Currently,Our Hash Code verifier tool supports the following Hash types: MD5,SHA,CRC32. More details about the tool can be found in the project homepage.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 15
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    This is a simple but sophisticated open source password recovery tool for M$ Windows, it can effectively 'crack' any password protected archive that can be decompressed by 7zip given enough time and resources. It can also bruteforce MD2, MD5, SHA-1 and SHA-2 hashes (SHA-256, SHA-384, SHA-512), CRC16, CRC32, CRC64 and Adler32 hashed passwords for both Windows, and Linux. It requires java 7u4 and above, and 7-zip v9.20 and up for archive recovery. Keeping these above applications up to date...
    Leader badge
    Downloads: 125 This Week
    Last Update:
    See Project
  • 16
    AllCheckSumer

    AllCheckSumer

    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    HashTool

    HashTool

    Easily calculate hash values.

    HashTool calculates the most common hash and hmac values of files and strings by using the "Bouncy Castle Java cryptography API".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Java File Checksum tool for calculating an hash (MD5, SHA-1, SHA-256, SHA-512).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Tool for encrypting files using blowfish, aes, des or cast5, File hashing with md5, sha and ripemd160, compresssion with gzip, and a nice user interface. Created using C++ with Qt framework, depends on QCA third-part Qt Library and OpenSSL.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    This is a Hash Calculating tool that calculates MD2,MD5,SHA-1,SHA-256,SHA-384,SHA-512 hash of text or a file. This has GUI developed in java swings.All it needs is sun jre installed.
    Leader badge
    Downloads: 5 This Week
    Last Update:
    See Project
  • 23
    Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others. Moved to Github: https://github.com/AndreyRusyaev/acryptohashnet
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Hash Cracker is an application developed in java swings that allows a user to crack MD2, MD5, SHA-1,SHA-256,SHA-384,SHA-512 hashes either using brute force or using wordlists of the user's choice based on the users choice.
    Downloads: 5 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next