33 programs for "sha 512" with 1 filter applied:

  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is a JAVA-based open source EDIINT AS2 solution. Logging- and configuration GUI (SWING), async & sync MDN, signatures, encryption, SSL, web interface, pluggable into any servlet container, TP manager, compression, optional profiles: MA, FN
    Leader badge
    Downloads: 173 This Week
    Last Update:
    See Project
  • 2
    mendelson OFTP2

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, SSL, certificate exchange, message routing, mail notification
    Leader badge
    Downloads: 61 This Week
    Last Update:
    See Project
  • 3
    PyCheck

    PyCheck

    Calculates the checksum of a file, and compares it to an original.

    PyCheck calculates the checksum of a file, and compares it to an original either by selecting an original copy of the file, or manually entering the checksum of the original file, such as when it is provided on a website from which you downloaded a file. In Linux this program depends on the Python3 TK package, so make sure you have python3-tk installed using your distribution's package manager before continuing. I digitally sign some files in my releases. If you'd like to verify those...
    Downloads: 17 This Week
    Last Update:
    See Project
  • 4
    fileaxy

    fileaxy

    Fileaxy does file sync, de-duplication, image matching & bulk preview

    Fileaxy is a file de-duplication, organization, synchronization, and bulk previewing tool which utilizes a new user interface for local file management. Using content hashing or machine vision algorithms, Fileaxy can detect identical files as well as similar names, images, videos, or fonts and correlate those to others based on naming conventions. Optionally integrates with ImageMagick, GraphicsMagick, FFmpeg, and Mac Sips file decoding with a simple button click. Fileaxy opens NO network...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Shift, the browser that merges all of your web apps into one powerful window. Icon
    Shift, the browser that merges all of your web apps into one powerful window.

    Your power browser.

    Streamline everything you do online when you install Shift and access thousands of apps without leaving your browser. Connect all of your Gmail, Outlook, and Office 365 accounts and manage everything from one centralized window. Build out your Shift browser with apps that integrate seamlessly so you have ultra-fast access to all the tools you use to stream, shop, work, browse, and stay connected. Shift brings it all together.
    Try for Free
  • 5
    ARITA

    ARITA

    Extraordinary audio player for FreeBSD & GNU/Linux

    Unlike conventional audio players, ARITA aims to help music lovers to keep their precious collections well organized and tidy. Therefore it takes a different approach to arranging audio files. They must be emplaced into libraries: 'archives' or 'cuesheets'. Archive - compressionless container like CPIO. Instead of tags for description of tracks, a plain XML/YAML file is placed alongside each archive. Rather than embedding cover art in every track, put a single image next to a library. TIFF...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6

    tcl-sha

    SHA utilities for Tcl

    A Tcl loadable module to do SHA hashes. Compiles as SHA-512, SHA-384, SHA-512/256, SHA-512/224 or compiles as SHA-256, SHA-224.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    wxChecksums

    wxChecksums

    A program which calculates and verifies checksums.

    wxChecksums is a program which calculates and verifies checksums. wxChecksums is able to read and write files in SFV and MD5 format. It is available for Windows 2000/XP and Linux.
    Downloads: 19 This Week
    Last Update:
    See Project
  • 8
    SSHTOOLS

    SSHTOOLS

    Java SSH API

    This project now hosts the third-generation of Java SSH API, Maverick Synergy. This API builds on the Maverick Legacy commercial APIs and delivers a new API in a unified client/server framework. This API is available to the community under the LGPL open source license. This update includes ed25519 support, support for the new OpenSSH private key file format and stronger key exchange algorithms. The project continues to host both the original API and legacy applications created around...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 9
    Manifest Maker

    Manifest Maker

    NO LONGER MAINTAINED

    NO LONGER MAINTAINED, NO LONGER SUPPORTED Manifest Maker is a graphical Python application which takes a file or group of files and creates a plain text manifest list of each item. The manifest includes the file name (including directory structure) as well as a checksum of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Automated quote and proposal software for IT solution providers. | ConnectWise CPQ Icon
    Automated quote and proposal software for IT solution providers. | ConnectWise CPQ

    Create IT quote templates, automate workflows, add integrations & price catalogs to save time & reduce errors on manual data entry & updates.

    ConnectWise CPQ, formerly ConnectWise Sell, is a professional quote and proposal automation software for IT solution providers. ConnectWise CPQ offers a wide range of tools that enables IT solution providers to save time, quote more, and win big. Top features include professional quote or proposal templates, product catalog and sourcing, workflow automation, sales reporting, and integrations with best-in-breed solutions like Cisco, Dell, HP, and Salesforce.
    Learn More
  • 10

    MySuiteA

    This is not NSA Suite B. This is MySuiteA!

    MySuiteA is a cryptographic suite consisting of symmetric ciphers and hash algorithms, as well as two proof-of-concept quantum-safe asymmetric cryptographic algorithms for digital signature and key agreement. This suite implements: AES-128, AES-192, AES-256, SHA-224, SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256, SHA3-224, SHA3-256, SHA3-384, SHA3-512, SHAKE128, SHAKE256, NEWHOPE, REBLISS-512A, (and the self-devised)REBLISS-1024A, among a few other things...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    JBrute

    JBrute

    Open Source Security tool to audit hashed passwords.

    JBrute is an open source tool written in Java to audit security and stronghold of stored password for several open source and commercial apps. It is focused to provide multi-platform support and flexible parameters to cover most of the possible password-auditing scenarios. Java Runtime version 1.7 or higher is required for running JBrute. Supported algorithms: MD5 MD4 SHA-256 SHA-512 MD5CRYPT SHA1 ORACLE-10G ORACLE-11G NTLM LM MSSQL-2000 MSSQL-2005 MSSQL-2012 MYSQL-322 MYSQL...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    CorsoDB Web Application Framework

    A Bootstrap-based web app framework with user management and more.

    Welcome to CorsoDB Web App Framework! CorsoDB is a Bootstrap and PHP based web app framework - a pre-built website template built to serve as either a site or an app - with login/register/user management PHP and SQL pre-implemented by default, with high-end encryption models, specifically SHA-512 Algorithms with signature customised rehashing. There are pages created for login, register, error, member's logged in page, logged out page, and neatly-structured file systems for plugin...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Checksum Directory

    Checksum Directory

    Check some checksum!

    A secure and centralized way to get checksums of common downloads. You will find the usual MD5 hash, but also the newer and more secure hashes like SHA-1, SHA-256 and even SHA-512. If the filesize and all up to four hashes match, you should be save to use that downloaded file.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    ... to efficiently cipher text of arbitrary length or files of any size or type. Use it with confidence. To achieve complete one-on-one privacy, SES traverses several levels en route to its output. The more words in your key-phrase, the more layers of encipherment SES applies. It is part Vigenere, part onetime pad, part cryptographic hash, not to mention the essential scrambler element, each component driven by ISAAC, with all key-derivation and stretching relying on Keccak in 512-bit configuration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Is My Download Broken?

    Is My Download Broken?

    a powerful multipurpose checksum utility

    It's a cross platform utility designed for performing various checksumming activities. It supports verity of standards including ADLER-32, CRC-32, MD2, MD5, MURMUR-32, MURMUR-128, SHA-1, SHA-256, SHA-384, SHA-512 and SIPHASH24. Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This tool can create XAdES (XML) signatures based upon ETSI TS 101 903 v1.3.2 standard. It also includes handling of ITU-T X.509 certificates and RFC 3161 timestamps.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    PasswordGenerator

    PasswordGenerator

    A free Password Generator written in Java

    next version is 2.4.6
    Downloads: 2 This Week
    Last Update:
    See Project
  • 19
    J! Secure Password Hashes
    J! Secure Password Hashes provided an easy access to all Joomla! password hash algorithms and the Drupal 7 SHA-512 hashing algorithm. Compatible: Joomla! 2.5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    This is a simple but sophisticated open source password recovery tool for M$ Windows, it can effectively 'crack' any password protected archive that can be decompressed by 7zip given enough time and resources. It can also bruteforce MD2, MD5, SHA-1 and SHA-2 hashes (SHA-256, SHA-384, SHA-512), CRC16, CRC32, CRC64 and Adler32 hashed passwords for both Windows, and Linux. It requires java 7u4 and above, and 7-zip v9.20 and up for archive recovery. Keeping these above applications up to date...
    Leader badge
    Downloads: 133 This Week
    Last Update:
    See Project
  • 21
    HashTool

    HashTool

    Easily calculate hash values.

    HashTool calculates the most common hash and hmac values of files and strings by using the "Bouncy Castle Java cryptography API".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Java File Checksum tool for calculating an hash (MD5, SHA-1, SHA-256, SHA-512).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    jsSHA is a JavaScript implementation of all variants of the SHA family of hashes (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512) as well as HMAC.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Password Manager is a program which can be used to keep passwords and important data in a safe place.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next