Showing 5 open source projects for "hash file"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1

    Cisco IOS Device Manager

    Cisco IOS Device Management (backup, update image, save conf, reboot)

    INFORMATION This program can be used for the following: - To collecting Cisco device information like: hostname, serial, model, IOS image, version, uptime, free memory (to CSV) - To enable the SCP service on the device (automaticly before file transfers) - To make a backup of the running-config and startup-config with SCP (with built-in MD5 hash comparison check) no TFTP/SFTP server needed. - To save the running-config to the startup-config (write memory) - To transfer a new image to the device with SCP (with built-in MD5 hash comparison check) - To change the boot target to the new image (boot system flash:/) It has got the following features: - Error handling - information and error logging to log file (Log will be appended) - information and error logging to CSV file (Log will be overwritten each run) - Transfers retry 3 times - MD5 checks after file transfers to be sure the file is transferred without problems
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Revenssis Ethical Hacking Suite

    Revenssis Ethical Hacking Suite

    Fully featured network, wireless and web app pentesting suite.

    Nicknamed as the "Smartphone Version of Backtrack", Revenssis Penetration Suite is a set of all the useful types of tools used in Computer and Web Application security. Tools available in it include: Web App scanners, Encode/Decode & Hashing tools, Vulnerability Research Lab, Forensics Lab, plus the must-have utilities (Shell, SSH, DNS/WHOIS Lookup, Traceroute, Port Scanner, Spam DB Lookup, Netstat... etc). All these fitting in an application approx. 10MB (post installation).
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    BitDHT is a LGPL'd general purpose C++ Distributed Hash Table library. It is designed to take hassle out over creating your own DHT. BitDHT is compatible with bitttorrent's DHT and can leverage this network to bootstrap your own personal DHT.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Entangled is a distributed hash table (DHT) and peer-to-peer tuple space, based on Kademlia. It is written in Python, and makes use of the Twisted framework. This can be used as a base for creating peer-to-peer (P2P) network applications.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Secure File Transfer for Windows with Cerberus by Redwood Icon
    Secure File Transfer for Windows with Cerberus by Redwood

    Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.

    Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
    Try for Free
  • 5
    The MD5summer is a GUI application for generating and verifying MD5 checksums of files. Entire directory structures can be summed recursively. Input and output files are compatible with those of the GNU md5sum application.
    Downloads: 6 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB