Showing 506 open source projects for "hash"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 1
    HASH

    HASH

    The best way to use and work with blocks

    This is HASH's public monorepo which contains our public code, docs, and other key resources. HASH is a platform for decision-making, which helps you integrate, understand and use data in a variety of different ways. HASH does this by combining various different powerful tools together into one simple interface. These range from data pipelines and a graph database, through to an all-in-one workspace, no-code tool builder, and agent-based simulation engine.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HighwayHash

    HighwayHash

    Fast strong hash functions: SipHash/HighwayHash

    HighwayHash is a fast, keyed hash function intended for scenarios where you need strong, DoS-resistant hashing without the full overhead of a general-purpose cryptographic hash. It’s designed to defeat hash-flooding attacks by mixing input with wide SIMD operations and a branch-free inner loop, so adversaries can’t cheaply craft many colliding keys. The implementation targets multiple CPU families with vectorized code paths while keeping a portable fallback, yielding high throughput across platforms. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    xxHash

    xxHash

    Extremely fast non-cryptographic hash algorithm

    xxHash is an extremely fast non-cryptographic hash algorithm, working at RAM speed limit. It is proposed in four flavors (XXH32, XXH64, XXH3_64bits and XXH3_128bits). The latest variant, XXH3, offers improved performance across the board, especially on small data. It successfully completes the SMHasher test suite which evaluates collision, dispersion and randomness qualities of hash functions.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Czkawka

    Czkawka

    Multi functional app to find duplicates, empty folders, similar images

    Czkawka (Polish for “hiccup”) is a lightning‑fast, multi‑purpose file cleaning tool written in Rust. It helps users declutter storage by finding duplicate files, similar images or audio, empty folders, and unusually large files through CPU‑efficient multithreading. Available with both GUI (GTK‑based) and CLI versions for flexible usage.
    Downloads: 201 This Week
    Last Update:
    See Project
  • Comet Backup - Fast, Secure Backup Software for MSPs Icon
    Comet Backup - Fast, Secure Backup Software for MSPs

    Fast, Secure Backup Software for Businesses and IT Providers

    Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
    Learn More
  • 5
    rosedb

    rosedb

    High performance NoSQL database based on bitcask

    A high-performance NoSQL database based on bitcask, supports string, list, hash, set, and sorted set. rosedb is a fast, stable, and embedded NoSQL database based on bitcask, that supports a variety of data structures such as string, list, hash, set, and sorted set. Easy to embed into your own Go application. High performance, suitable for both read and write-intensive workloads. Values are not limited by RAM.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Planet

    Planet

    Build and host decentralized blogs and websites on your Mac

    ...Since both IPFS and ENS are decentralized, you can use Planet to build and follow websites in a decentralized way. Did you know that you can use an Ethereum Name (ENS) to set up a website? It's true! You can use the Content Hash field, just like you would use an A or CNAME record for a traditional domain name. The standard for this is EIP-1577, and the Content Hash field can accept a few different values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    Hash-Machine

    Hash and compare multiple files and multiple SHA-256 strings

    Hash Machine is a small Go project that provides quick hashing and comparison of local files and SHA-256 strings. It is a command line utility that accepts between 2 and 10 arguments, and then reports on matching groups and unmatched arguments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Jbuilder

    Jbuilder

    Generate JSON objects with a Builder-style DSL

    Jbuilder gives you a simple DSL for declaring JSON structures that beats manipulating giant hash structures. This is particularly helpful when the generation process is fraught with conditionals and loops. You can either use Jbuilder stand-alone or directly as an ActionView template language. When required in Rails, you can create views à la show.json.jbuilder (the json is already yielded). Fragment caching is supported, it uses Rails.cache and works like caching in HTML templates. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    TOML

    TOML

    Tom Preston-Werner's obvious, minimal language

    ...By Tom Preston-Werner, Pradyun Gedam, et al. TOML aims to be a minimal configuration file format that's easy to read due to obvious semantics. TOML is designed to map unambiguously to a hash table. TOML should be easy to parse into data structures in a wide variety of languages. TOML shares traits with other file formats used for application configuration and data serialization, such as YAML and JSON. TOML and JSON both are simple and use ubiquitous data types, making them easy to code for or parse with machines. TOML and YAML both emphasize human readability features, like comments that make it easier to understand the purpose of a given line. ...
    Downloads: 16 This Week
    Last Update:
    See Project
  • Powerful cloud-based licensing solution designed for fast-growing software businesses. Icon
    Powerful cloud-based licensing solution designed for fast-growing software businesses.

    A single-point of license control for desktop, SaaS, and mobile applications, APIs, VMs and devices.

    10Duke Enterprise is a cloud-based, scalable and flexible software licensing solution enabling software vendors to easily configure, manage and monetize the licenses they provide to their customers in real-time.
    Learn More
  • 10
    Hyprspace

    Hyprspace

    A Lightweight VPN Built on top of IPFS + Libp2p

    A Lightweight VPN Built on top of IPFS & Libp2p. Libp2p is a networking library created by Protocol Labs that allows nodes to discover each other using a Distributed Hash Table. Paired with NAT hole punching this allows Hyprspace to create a direct encrypted tunnel between two nodes even if they're both behind firewalls. Moreover! Each node doesn't even need to know the other's ip address prior to starting up the connection. This makes Hyprspace perfect for devices that frequently migrate between locations but still require a constant virtual ip address.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    Modsurfer

    Modsurfer

    Modsurfer provides ops & dev teams with a system of record

    Modsurfer provides ops & dev teams with the first system-of-record and diagnostics application to search, browse, validate, audit, and investigate WebAssembly binaries. At-a-glance insights into WebAssembly module data (code size & complexity, imports/exports & more). Search for details about modules (hash, ID, function names, strings, namespaces, errors & more). Easily audit and track all the WebAssembly code in your stack. Debug & triage issues otherwise difficult to pinpoint in opaque WebAssembly format. Write or generate a "check file" to track binary requirements. If a module fails validation, a helpful report is created to get things back on track. ...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    Toast

    Toast

    Containerize your development and continuous integration environments

    ...Tasks can depend on other tasks, so Toast can be understood as a high-level containerized build system. Toast caches each task by committing the container to an image. The image is tagged with a cryptographic hash of the shell command for the task, the contents of the files copied into the container, and all the other task inputs. This hash allows Toast to skip tasks that haven't changed since the last run. In addition to local caching, Toast can use a Docker registry as a remote cache. You, your teammates, and your continuous integration (CI) system can all share the same remote cache.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    jekyll-notion

    jekyll-notion

    Import pages from notion

    Import notion pages to Jekyll.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 14
    hashcat

    hashcat

    World's fastest and most advanced password recovery utility

    hashcat is the world's fastest and most advanced password recovery utility, supporting five unique modes of attack for over 300 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and macOS, and has facilities to help enable distributed password cracking. Download the latest release and unpack it in the desired location. Please remember to use 7z x when unpacking the archive from the command line to ensure full file...
    Downloads: 118 This Week
    Last Update:
    See Project
  • 15
    Detect It Easy

    Detect It Easy

    Program for determining types of files for Windows, Linux and MacOS

    Detect It Easy (DiE) is a tool for determining the type and internal features of binary and other file formats. It is widely used by malware analysts, digital forensics investigators, reverse engineers, and security researchers to quickly inspect unknown files and infer their type, architecture, compiler/packer used, and internal structure. DiE supports a large variety of file formats — from common executables (Windows PE, Linux ELF, macOS Mach-O) to archives, mobile packages (APK, IPA),...
    Downloads: 113 This Week
    Last Update:
    See Project
  • 16
    OTPLib

    OTPLib

    One Time Password (OTP) / 2FA for Node.js and Browser

    A JavaScript library for generating and verifying one-time passwords (TOTP/HOTP), commonly used for two-factor authentication (2FA).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Tiny CUDA Neural Networks

    Tiny CUDA Neural Networks

    Lightning fast C++/CUDA neural network framework

    ...Lower-end cards must reduce the n_neurons parameter or use the CutlassMLP (better compatibility but slower) instead. tiny-cuda-nn comes with a PyTorch extension that allows using the fast MLPs and input encodings from within a Python context. These bindings can be significantly faster than full Python implementations; in particular for the multiresolution hash encoding.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 18
    Redis

    Redis

    An in-memory database that persists on disk

    ...Redis has built-in replication, Lua scripting, LRU eviction, transactions, and different levels of on-disk persistence, and provides high availability via Redis Sentinel and automatic partitioning with Redis Cluster. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing an element to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. To achieve top performance, Redis works with an in-memory dataset. Depending on your use case, you can persist your data either by periodically dumping the dataset to disk or by appending each command to a disk-based log.
    Downloads: 36 This Week
    Last Update:
    See Project
  • 19
    sttr

    sttr

    Cross-platform, cli app to perform various operations on string

    sttr is command-line software that allows you to quickly run various transformation operations on the string.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Rclone

    Rclone

    Rsync for cloud storage

    Rclone is a command line program for syncing files and directories to and from various cloud storage providers, including Google Drive, Amazon Drive, S3, Dropbox, Backblaze B2, One Drive, Swift, Hubic, Cloudfiles, Google Cloud Storage, Yandex Files and many more.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 21
    Toot

    Toot

    toot - Mastodon CLI & TUI

    Toot is a CLI and TUI tool for interacting with Mastodon instances from the command line.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Optimus id transformation

    Optimus id transformation

    Id obfuscation based on Knuth's multiplicative hashing method for PHP

    With this library, you can transform your internal IDs to obfuscated integers based on Knuth's integer hash. It is similar to Hashids but will generate integers instead of random strings. It is also super fast. If you will be running your code on a 32-bit system or will be working with large prime numbers it is suggested that you install the GMP extension.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    DwarFS

    DwarFS

    A fast high compression read-only file system for Linux, Windows

    The Deduplicating Warp-speed Advanced Read-only File System. A fast high compression read-only file system for Linux and Windows. DwarFS is a read-only file system with a focus on achieving very high compression ratios in particular for very redundant data. This probably doesn't sound very exciting, because if it's redundant, it should compress well. However, I found that other read-only, compressed file systems don't do a very good job at making use of this redundancy. See here for a...
    Downloads: 15 This Week
    Last Update:
    See Project
  • 24
    BitTorrent DHT

    BitTorrent DHT

    Simple, robust, BitTorrent DHT implementation

    bittorrent-dht is a Node.js implementation of the BitTorrent Mainline Distributed Hash Table (DHT) protocol, enabling decentralized peer discovery for BitTorrent clients. This module allows users to announce and lookup peers for specific torrents without the need for trackers. It’s lightweight, fast, and well-suited for building custom torrent clients, browser-based peers, or decentralized apps. This project powers part of WebTorrent and is maintained with performance and minimalism in mind.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 25
    KadNode

    KadNode

    P2P DNS with content key, crypto key and PKI support

    KadNode is a decentralized DNS resolver that uses the BitTorrent Distributed Hash Table (DHT) network to resolve domain names, particularly those ending with .p2p. It operates as a lightweight daemon, intercepting DNS requests and providing IP address resolutions without relying on centralized DNS infrastructure. KadNode supports authentication mechanisms to ensure the integrity and authenticity of the resolved addresses.​
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next