Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
This is a Hash Calculating tool that calculates MD2,MD5,SHA-1,SHA-256,SHA-384,SHA-512 hash of text or a file. This has GUI developed in java swings.All it needs is sun jre installed.
Tokyo Cabinet is the successor of QDBM, a high performance database library similar to the DBM family. It also supports hash and B-tree databases and does not require any server process. The overall speed is improved compared to QDBM.
BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.
JChecksum allows you to obtain the hash of a given file using a simple GUI. Hash algorithms supported include MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
Secure downloads by checksum verification using several hash algorithms like md5 or sha1 to verify your downloaded packages using an independet third site.
The EURP OntoLookup is a CREOLE plugin for GATE http://www.gate.ac.uk/ which uses an OWL ontology for lookup. It has a very fast implementation based on a tree of hash maps.
OpenChord is an open source implementation of the Chord distributed hash table as described in the paper by Ion Stoica et al. "Chord: A scalable peer-to-peer lookup service for internet applications". It is available under GNU GPL.
DuMP3 is a duplicate and similar file finder. It finds exact duplicate binaries by hash, similar text files by substring content, images (JPG, BMP, GIF, PNG, etc) by color and audio files (MP3, WAV, OGG, etc) by wave data. Future: fonts, video.
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Small, simple and robust database in Java. If you need a persistent hash map, this is for you. It is basically as fast as it gets without caching, but doesn't offer any non-basic features like transactions or concurrent access.
Hash Cracker is an application developed in java swings that allows a user to crack MD2, MD5, SHA-1,SHA-256,SHA-384,SHA-512 hashes either using brute force or using wordlists of the user's choice based on the users choice.
S/Key Generator. An RFC2289 compliant One-Time Password generator written in Java language and O.S. Thinlet package for GUI.
It uses MD4 and MD5 hash algorithms.
S/Key - OTP Generator for J2ME architecture. An RFC2289 compliant One-Time Password generator for mobile phone supporting Java language. It uses MD4 and MD5 hash algorithms.
HashserGUI is a GUI interface for Jacksum. It is intended to provide a graphical tool to create hashes for files within a directory, and check the hashes generated. It works with many hash functions, as md5, sha1, sha256, sha512, md4, crc, etc.
A utility that uses the shebang (hash-bang) mechanism to create self-contained executable java applications that require no support files and can be executed on the unix command line
ImageComparitor is a utility for Mac OS X and Windows (technically everything since it's a Java program) designed to compare pictures/image files inside a folder for duplicate images (based on file hash) and remove excess duplicates (while retaining you
Using one-way hash algorithms and encryption, will generate a password based on a master password and site URL. Java based, so it can run on most operating systems and produce the same password consistantly. Future versions will include a username keyrin
Dermi (Decentralized Event Remote Method Invocation) is a peer-to-peer (P2P), decentralized event-based object middleware framework built on top of a structured Distributed Hash Table based overlay network.
Meta-Ja is to Java what C++ was to C - it lets you express Java class hierarchies at a higher level of abstraction, and then writes XML Schema files, constructors, hash-access type-safe lists, get, set, copy, print, and XML parsing/generation functions.
Provides efficient, effective implementations of 32- and 64-bit hash functions based on Rabin fingerprints / irreducible polynomials, in Java. Also provides integration with java.security.MessageDigest API.
Synclair is a tool for diff'ing and synchronizing directories. It also includes a utility to find duplicate files (by name, or md5 hash). It is a command line tool, written in Java.
Verifier/validator for the install4J commercial Java installer. Uses a simple hash comparison taken remotely and a local installation binary. Code is in subversion!