Showing 9 open source projects for "tar md5 create"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1
    YARA

    YARA

    The pattern matching swiss knife for malware researchers

    YARA is a tool aimed at (but not limited to) helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families (or whatever you want to describe) based on textual or binary patterns. Each description, a.k.a rule, consists of a set of strings and a boolean expression which determines its logic. YARA is multi-platform, running on Windows, Linux and Mac OS X, and can be used through its command-line interface or from your own Python...
    Downloads: 33 This Week
    Last Update:
    See Project
  • 2
    ARITA

    ARITA

    Extraordinary audio player for FreeBSD & GNU/Linux

    Unlike conventional audio players, ARITA aims to help music lovers to keep their precious collections well organized and tidy. Therefore it takes a different approach to arranging audio files. They must be emplaced into libraries: 'archives' or 'cuesheets'. Archive - compressionless container like CPIO. Instead of tags for description of tracks, a plain XML/YAML file is placed alongside each archive. Rather than embedding cover art in every track, put a single image next to a library. TIFF...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    rsptar_gzip

    rsptar_gzip

    TAR based DLL

    C code and DLL (with sample project) with library libarchive and GNU tar 1.34 to list, update, delete, extract and create latest GNU tar files uncompressed or compressed with gzip, gzip2, gzip2 multi-thread, bzip2, bzip3, bzip3 multi-thread, lzip, lzop, lzop2, lzop2 multi-thread, lz4, lz5 multi-thread, lzma, brotli, brotli2 multi-thread, Zstandard, xz , the old Unix compression utility 'compress' (.Z) , compress2 multi-thread (.Z2), zip, 7zip and many more formats with full Unicode support...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Xarchiver is a GTK+2 only frontend to 7z,zip,rar,tar,bzip2, gzip,arj, lha, rpm and deb (open and extract only). Xarchiver allows you to create,add, extract and delete files in the above formats. 7z, zip, rar, arj password protected archives are supported
    Downloads: 62 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 5

    MLCrypt

    Simple, lightweight, standalone command-line single file encryption.

    ... Windows - MLCrypt was created because of this. The program's primary aim is cascade encryption: create an encrypted outer layer over an existing compressed and encrypted archive file. (Each encryption layer should have a different complex password.) MLCrypt.zip contains all the executables: Linux, Windows, Raspberry Pi.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 6
    This utility allows you to _pipe_ cpio or tar output into the ftpbackup command, allowing a backup to be sent to a remote machine. If you use the standard ftp client, you must have enough disk space to create your backup image first.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Hello! It`s my science work. I have to create the app, which calculates MD5 digest for messages (strings) and can "recover" the message for known digest.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    An opensource implementation of a commandline SFV application for linux to both create and verify .sfv files. It will be ported to other OS's once finished. Currently supported checksum files are SFV/MD5/SHA1.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    RPM Workshop is for the experienced/professional packager. This tool will give the packager GUI access to take a new tar file and create a spec file and RPMS or open an exsisting spec file for updating.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
    Learn More
  • Previous
  • You're on page 1
  • Next