Showing 20 open source projects for "hash compare"

View related business solutions
  • Shift, the browser that merges all of your web apps into one powerful window. Icon
    Streamline everything you do online when you install Shift and access thousands of apps without leaving your browser. Connect all of your Gmail, Outlook, and Office 365 accounts and manage everything from one centralized window. Build out your Shift browser with apps that integrate seamlessly so you have ultra-fast access to all the tools you use to stream, shop, work, browse, and stay connected. Shift brings it all together.
  • Holistically view your business data within a single solution. Icon
    Holistically view your business data within a single solution.

    For IT service providers and MSPs that need a data platform to manage their processes

    BrightGauge, a ConnectWise solution, was started in 2011 to fill a missing need in the small-to-medium IT Services industry: a better way to manage data and provide the value of work to clients. BrightGauge Software allows you to display all of your important business metrics in one place through the use of gauges, dashboards, and client reports. Used by more than 1,800 companies worldwide, BrightGauge integrates with popular business solutions on the market, like ConnectWise, Continuum, Webroot, QuickBooks, Datto, IT Glue, Zendesk, Harvest, Smileback, and so many more. Dig deeper into your data by adding, subtracting, multiplying, and dividing one metric against another. BrightGauge automatically computes these formulas for you. Want to show your prospects how quick you are to respond to tickets? Show off your data with embeddable gauges on public sites.
  • 1

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    This project offers an Excel spreadsheet, available for download through the Files tab (above). The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the files...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Hash Latch
    ... you the actual key, it gives you a safe containing the key. This approach allows the hash latch to protect itself from forged keys and also enables you to put the same key into multiple safes without the recipients of these safes knowing they have the same key (even if they compare their ciphertexts). Moreover, the hash latch verifies the integrity of a key after decrypting it (just in case). You can read the tutorial about it on Instructables: https://www.instructables.com/Hash-Latch/
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    With this tool you are able to test different hashes: - MD2 - MD5 - SHA1 - SHA224 - SHA256 - SHA384 - SHA512 Recommended Java 8 For any questions you may use the ticketing system .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    JChecksum

    JChecksum

    MD5 Checksum Tool

    This tool checks the integrity of files. It is very important if you don’t want your computer to get infected with viruses and malware. Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files. This tool enables you to verify the file integrity of the downloaded...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Control remote support software for remote workers and IT teams Icon
    Control remote support software for remote workers and IT teams

    Raise the bar for remote support and reduce customer downtime.

    ConnectWise ScreenConnect, formerly ConnectWise Control, is a remote support solution for Managed Service Providers (MSP), Value Added Resellers (VAR), internal IT teams, and managed security providers. Fast, reliable, secure, and simple to use, ConnectWise ScreenConnect helps businesses solve their customers' issues faster from any location. The platform features remote support, remote access, remote meeting, customization, and integrations with leading business tools.
  • 5

    dotNet File Hash

    An implementation of various hashing algorithms in C# 4.0

    This is a C# .Net 4.0 file hashing Windows application that implements a variety of hashing algorithms (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD160) readily available in the System.Security.Cryptography section of the .Net framework and can be used to compare files from various folders for true file duplications by directly hashing the content and ignoring other extended details. The application UI is pretty crude, but the underlying code is quite lean. As always, this application...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    CoSA (Concurrent Subtractive assembly) is a package to detect differential short sequencing reads by comparing two groups of metagenomes on the basis of kmer frequencies. KMC 2 is one of the fastest k-mer counting implementations, so we employ KMC 2 for k-mer counting in our package. Because in many cases we need to compare tens of or even hundreds of samples, we adopt the concurrent hash table in Libcuckoo for efficient k-mer counting. Once the differential reads are extracted, they can...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Small application which can help you to verify hashes and if your files from internet weren't broken. Supported hashes: CRC32, sha1 - sha512. Platform: .NET, Mono. Windows Shell integration. Can compare to hash in clipboard. Color highlighting.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8

    qlsdup

    GUI based lightweight duplicate file finder / remover.

    ... for large file sets with few differences: basic set of duplicate candidates is determined by file size, then candidates are compared byte-wise. So for files which don't start to differ by growing at the tail it reduces read operations greatly compared to hash-based comparision (i.e. test case: 40GB of files, 16GB RAM, many differences: initial compare (uncached by OS) around 300sec, subsequent compare (relevant file parts cached by OS) ca. 2sec) Note: this program is not related to lsdup
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Hash Monster
    A versatile gui and console application capable of generating and comparing hashes using a variety of popular hashing libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gain insights and build data-powered applications Icon
    Gain insights and build data-powered applications

    Your unified business intelligence platform. Self-service. Governed. Embedded.

    Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
  • 10
    AllCheckSumer

    AllCheckSumer

    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A console application to find duplicated files in your hard disk that allows you to choose which duplicated files delete. It will work with a DB to store information of your files and compare them using a hash code like md5. Wait! I am still working
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A file hash generator. Generates MD5, SHA-1, SHA-256 and SHA-512 hashes for the selected file. Can choose any combination of the 4 hashes. Simple, Small and fast. Works great on ISO's and any other files. I might add in ability to compare hashes to
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A Java Programm to sort JPEG-Images from digital still image cameras. The sorting is done by the capture date/time of the EXIF-Header. Image meta informations from EXIF-Header is stored in a database. Double files will be recognized by MD5-hash compare.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    mwsync tries to be faster then rsync on very low speed target devices by using a local hash file for compare (thus avoiding the remote compare on each run).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A CLI program for Linux to allow users to list, rename or remove duplicate files by means of a hash list. It also stores the file size which is a very fast way to check if the file differs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    MUSASH provides a utility to digest text, file and a byte char. It also able to compare two files, compare file, text and char to a hash. It also allows user to search for a string that evaluates to a hash given. Supported algo: MD5, SHA1 and SHA2 family
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Recursively compare two directory trees using message digest (hash). E.g. MD5
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Message digest (hash) multi-tool. Create multiple hash values for files, directories or other input. Output hashes in several formats compatible with other existing tools. Compare file and directory structures against one another.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Compares two values of any type and structure and returns true if they are the same. It does a deep comparison of the structures, so a hash of a hash of a whatever will be compared correctly. This is especially useful for writing unit tests!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    The program uses a number of processes to brute-force crack MD5 hashes. MD5 brute-force cracking involves hashing all possible strings and each time compare the obtained hash to the one we are trying to crack
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next