Showing 71 open source projects for "sha3-256"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    "Kawashti tools" is a collection of Windows command-line tools that make it more usable. Some of the tools also provide functionality not matched elsewhere, even Unix-like OSes. Tools range from a simple command clocker to an AES-256 cipher.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    kokla
    Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    SHA PadLock computes SHA-1 or SHA-256 file checksums using VIA Nano's processors hardware PHE engine. Currently it can only be run on VIA Nano processors (in Samsung NC20 netbook for example) under Windows. It was build using VIA PadLock SDK.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
    Get started free
  • 5
    The CRY utility provides the ability to perform AES-256 symmetric key encryption of files. This is a light weight Linux utility and does not depend on PKI infrastructure. Rather, pre-shared encryption keys are used to protect your files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    A streaming Ogg/Vorbis player for the PSP. Handles a wide range of sample rates (8000 Hz to 48000 Hz), high bitrates (tested on bitrates to 256 Kbps); has separate recv/decode/audio threads and buffers for stable sound even on highly uneven streams.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    'EOS' is a fully-featured preemptive real time kernel developed for the Infineon XC167 microcontroller. Performance summary: A typical context switch will take about 100[microsecond] at 40[MHz], when all tasks have a stack of 256 bytes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A self contained cross platform utility for encrypting (and decrypting) files using AES 256 (and SHA 256) for secure transportation or privacy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    EAP-SRP-256 is password-based authentication method that has been designed to operate in wireless networks and relies on the SRP-6 protocol. This EAP method allows mutual authentication between client & server, deriving a set of symmetric keys.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    lcslib is a free library intended for finding longest common substrings in byte strings. It implements structure of suffix tree that is highly optimized for 256-character alphabet. It was originally implemented for finding signatures in TCP dumps.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    sfic is a Simple File Integrity Checker, similar to Tripwire or yafic, but much smaller. It uses tdb as the database backend and there are no configuration files. It uses SHA-256 as its hash function.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    QRes provides automatic screen mode change for Windows applications. For instance, you can make QRes switch to 800 x 600 @ 256 colors as long as you run a game and switch back to your regular screen mode when it is over. Win32 app written in C/C++.
    Leader badge
    Downloads: 903 This Week
    Last Update:
    See Project
  • 13
    Fast 256 bit hash algorithm and simple command line utility. Also does sha-1 and sha-256.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    CTNHashProc is a Microsoft SQLServer 2000 Extended Stored Procedure that returns the hash of a given string. Currently the supported hash functions are SHA (SHA1), SHA2 (SHA-256, SHA-384, SHA-512), MD5, RIPEMD-160, Tiger.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    sha is a file hashing utility that uses the NIST's SHA-1, SHA-256, SHA-384, & SHA-512 hash algorithms. It can be used for file integrity checking, remote file comparisons, etc. The portable algorithm implementations can be useful in other projects too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Graph.h is a graphics library for ModeX graphics in TurboC. ModeX is a 320x240 screen mode with 256 indexed colors out of 262,000. There are four graphics pages available. Must use in TurboC and in DOS. main.exe demonstrates graph.h's abilities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Linux device driver for Genius GS-4500 handheld scanners. The driver also works with GS-4500A and Highscreen Greyscan 256 scanners.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    CryptKit is a small, fast cryptographic toolkit for python. It implements Rijndael(AES), SHA 256, Elliptic Curve PKI, Diffie-Hellman key exchange and Nyberg-Ruppel signature/verification. Comprehensive enough to provide a secure socket alternative to SSL
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    A tight python crypto module implementing only the latest and greatest: Rijndael (AES) symmetric cipher in 128, 192 and 256 bits supporting password encryption, SHA 256 and several CSPRNG schemes in pure python.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    FilterDriver

    File activities monitor and file access control, file encryption

    A.File and Folder Monitoring Monitor Windows file I/O activities in real time, track the file access and changes, monitor file and folder permission changes, audit who is writing, deleting, moving or reading files, report the user name and process name, get the user name and the ip address when the Windows file server's file is accessed by network user. B.File Access Control and Security Control Control Windows file I/O activities in real time, intercept the file system call, modify...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    BP-Tools

    BP-Tools

    Set of useful tools for payment service development

    The BP-Tools set consist from applications supporting EFT testing, benchmarking and transaction service development. BP-Tools suite currently consists of following three components: - BP-CCALC: Cryptographic Calculator - BP-CardEdit: Thales P3 Input/Output file editor - BP-EMVT: EMV Tool - BP-HCMD: Thales HSM Commander
    Downloads: 0 This Week
    Last Update:
    See Project