34 projects for "secure hash algorithm" with 1 filter applied:

  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    Node Argon2

    Node Argon2

    Node.js bindings for Argon2 hashing algorithm

    A Node.js library for hashing passwords securely using the Argon2 key derivation function, a modern cryptographic algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    PeaZip

    PeaZip

    Free Zip software and Rar extractor

    PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX. Create: 7Z, ARC, Brotl, BZip, GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP, Zstandard files and more Open and extract 200+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives...
    Leader badge
    Downloads: 1,606 This Week
    Last Update:
    See Project
  • 3
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    PetoronHash-System

    PetoronHash-System

    PHASH | post-quantum XOF hashing algorithm | C++20

    PHASH is a self-contained, dependency-free, post-quantum XOF hashing algorithm implemented in modern C++20. This release delivers the first fully stable production implementation of the PetoronHash-System — a 1600-bit sponge-based hash function with domain separation, extendable output, and deterministic behavior. Key Features No external dependencies — pure C++20 implementation. Extendable Output (XOF) — supports arbitrary output length (256–8192+ bits).
    Downloads: 0 This Week
    Last Update:
    See Project
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • 5
    PWSLIB3

    PWSLIB3

    Password Safe encrypted databases, Java library

    Java module to create, read and write Password Safe V3 encrypted databases. The package is a mature offspring from project JPasswords and can be used with Java 1.8. There is an API document available.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    cerberuscms2

    cerberuscms2

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    CerberusCMS5

    CerberusCMS5

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text, Voice and Video Communications Platform and Content...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 8
    Cerberus Content Management System 6

    Cerberus Content Management System 6

    Cerberus Content Management System

    Cerberus Content Management System is a dynamic, secure and infinitely expandable CMS designed after a Unix-Like model complete with a Unix-Like Kernel File named: Cerberus. It is a custom written Web Application Framework ( W.A.F. ) with a consistent and custom written Pre-Hyper-Text-Post-Processor Programming Code Framework ( P.C.F. ). This Web Application Software Project' aim is to be the fastest and most secure Web Application Framework, Web Application Programming Code Framework, Text,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    JavaScript MD5

    JavaScript MD5

    Compatible with server-side environments like node.js

    JavaScript-MD5 is a small, dependency-free implementation of the MD5 hashing algorithm written entirely in JavaScript, designed to run consistently across browsers, Node.js, and popular module loaders. It allows you to generate MD5 hashes from strings, arrays, ArrayBuffers, and other binary-like data types, making it useful for checksums, fingerprinting, and simple integrity checks on the client or server. The library is exposed as a plain function, so usage is as simple as calling md5(value) and receiving the 32-character hexadecimal hash.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10
    egg-token

    egg-token

    Egg.js middleware that uses encrypted token to authenticate

    Egg.js middleware that uses encrypted token to authenticate.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Manifest Maker

    Manifest Maker

    NO LONGER MAINTAINED

    NO LONGER MAINTAINED, NO LONGER SUPPORTED Manifest Maker is a graphical Python application which takes a file or group of files and creates a plain text manifest list of each item. The manifest includes the file name (including directory structure) as well as a checksum of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12

    Xamp

    This is Xamp, a secure and platform independend media player.

    This is Xamp, the next generation of a skinnable and platform independent media player which based on the Doppio media framework: https://sourceforge.net/projects/doppio. The player supports various pluggable video and audio formats. Xamp is primarily intend to run as a native executable but can also run as a Java player version working with Java 1.1 VM or above. To ensure the best user experience, the Java version of Xamp doesn't use the Java Media Framework, the high level part...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Checksum Directory

    Checksum Directory

    Check some checksum!

    A secure and centralized way to get checksums of common downloads. You will find the usual MD5 hash, but also the newer and more secure hashes like SHA-1, SHA-256 and even SHA-512. If the filesize and all up to four hashes match, you should be save to use that downloaded file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The MOTET Cipher & SE Scrambler

    The MOTET Cipher & SE Scrambler

    A tiny, fast encryption tool in C

    MOTET is a tiny, fast super-encipherment application written in C, featuring the new CSPRNG/stream ciphers MOTE and BEDBUG in each of their three variants, as well as the "gold standard" among ciphers, ISAAC. MOTET brings multiple levels of encryption, including a ciphertext-hash, a Vigenere mixing function, a choice of Caesar MOD or Caesar MIX ciphering on the primary key-stream, plus a deeply scrambled "outer shell" as a final super-encryption stage. A unique nonce IV guarantees that...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Azrar

    Azrar

    Encryption addressing long-term data secrecy

    ...Azrar is a user-friendly tool for the encryption/decryption of single files - preferably compressed archives - addressing long-term data secrecy. Thus, Azrar provides the possibility to use webspace for secure data transfer between two communication/transfer partners (encryption only, network transfer not yet included in current version). Data in encrypted files are secret/private indefinitely. To achieve long-term data secrecy, Azrar differs from other approaches in terms of not to rely on effective computational deficiencies. It combines a one-time pad with a stream cipher method using the strong cryptographic hash function (family) Skein. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    qlsdup

    GUI based lightweight duplicate file finder / remover.

    ...This is basically a reimplementation of dupfinder as: it doesn't compile on my computer, the executable won't work either, the projects seems dead and I didn't wanna work through the original code. So Look'n'Feel should be somewhat the same, though some changes have been made. Algorithm is simple and suitable for large file sets with few differences: basic set of duplicate candidates is determined by file size, then candidates are compared byte-wise. So for files which don't start to differ by growing at the tail it reduces read operations greatly compared to hash-based comparision (i.e. test case: 40GB of files, 16GB RAM, many differences: initial compare (uncached by OS) around 300sec, subsequent compare (relevant file parts cached by OS) ca. 2sec) Note: this program is not related to lsdup
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19

    Ajax Chat

    Chat application using MySQL, PHP and Javascript

    This web application will allow anyone to register using a first and last name and then once logged in it shows the user a list of people that are logged in right now. If they click user 2's name it pops up accept or cancel buttons for user 2. Once they click accept a chat box appears instead of the list of users you can chat with. It only allows you to chat with 1 person at a time. Later we could allow you to chat with more than 1 person in a chat box or more than 1 chat box at a time like...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 20
    OhCrypt Encryption Tool
    OhCrypt lets you easily encrypt and decrypt files using some of the most popular algorithms, like AES, Blowfish and Serpent. With OhCrypt, you can secure your data with a password-based encryption algorithm through a clean and simple interface. It demonstrates state of the art of cryptology techniques, such as password hashing and salt. Ohcrypt also features self-extractable and self-destructive encrypted files
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    AllCheckSumer

    AllCheckSumer

    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    A portable in-place bitwise binary Fredkin trie algorithm which allows for near constant time insertions, deletions, finds, closest fit finds and iteration. Is approx. 50-100% faster than red-black trees and up to 20% faster than O(1) hash tables.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    TinyCrypt is a simple secure program for encrypting files. The core encryption code is only 76 lines of C code, based on the well known ARC4-D(768) algorithm.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 24
    MUTE is a secure, anonymous, distributed communications framework. Node-to-node connections are encrypted, and messages are routed using an ant-inspired algorithm. The first MUTE-based app supports anonymous file sharing.
    Downloads: 69 This Week
    Last Update:
    See Project
  • 25
    Secure P2P Instant Messenger running on .NET Framework 2.0. Uses server to store user information (user name, password, email address, friends list, log in state, IP address) in encrypted form. Uses custom designed symmetric encryption algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next