Showing 20 open source projects for "hash"

View related business solutions
  • Payments you can rely on to run smarter. Icon
    Payments you can rely on to run smarter.

    Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.

    Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
    Learn More
  • Dun and Bradstreet Risk Analytics - Supplier Intelligence Icon
    Dun and Bradstreet Risk Analytics - Supplier Intelligence

    Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.

    Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
    Learn More
  • 1

    pl

    Perl One-Liner Magic Wand

    ...And same, SHOUTING: $  pl  -opl  ''  Perl  one-liner $  pl  -opl  '$_  =  uc'  Perl  one-liner Print up to 3 matching lines, resetting count (and "$.") for each file: $  pl  -rP3  '/Perl.*one.*liner/'  file* Count hits in magic statistics hash "%N(UMBER)": $  pl  -n  '++$N{$1}  while  /(Perl|one|liner)/g'  file*
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    __Alien Cipher

    __Alien Cipher

    A bespoke symmetric cipher.

    ...The primary aim is to simply learn the fundamentals and finer details of cryptography in general and build working examples of my ideas in code. The code is shared here for posterity (future folk) in the guise that it may help others also on the path to cryptography. This code demo uses a 256bit rolling hash table (8x8bytes) at its heart to mix together pre-defined parameters in a way that allows the cipher to produce encoded output that is locked to a key of arbitrary length without padding. Based upon some random data points the cipher produces encoded output that is non-deterministic in nature, the same key and message will never produce the same output each time it's run. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    好书阅读器 VReader

    可竖排(直排)阅读中文的电子书软件

    竖排(直排)阅读纯文本电子书阅读器。支持简本中文,与繁体(正体)中文的纯文本文件。可增减内嵌字体。分别改变正文内容与标题内容的字体,字号,与颜色。可修改背景色。横版与直版自由切换。可设置字距,行距,页边距,与是否显示分行线等功能。安装包内附加了目前最好的全字库楷体字体与隶书字体。用Hash文件目录的方式,可记忆每本书的阅读位置又不会泄露用户的浏览历史。 既可全屏显示,又能Esc一键最小化到系统托盘区。 这是介面简单,而又功能强大的文本电子书阅读器。 力图做到有阅读“古籍善本”的感觉。 最新版本增加了HTML5导出功能,可在任何系统上的浏览器上使用。
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Beta v1.2

    Juggernaut v1000 Anti-Cryptography

    Juggernaut v1000 can crack MD4, MD5, MD6, SHA1, SHA256, SHA384, SHA512, HMAC-MD5, HMAC-SHA1 and also all the Base-64 version of them in minutes... but the cracking process depends in your password wordlist/dictionary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Yeastar: Business Phone System and Unified Communications Icon
    Yeastar: Business Phone System and Unified Communications

    Go beyond just a PBX with all communications integrated as one.

    User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
    Learn More
  • 5

    CopyAndVerify

    Simple gui program to copy a file or dir, verify and save hash

    This is a simple program to copy files or directories and verify the copied file with hashes. Hash is saved in .hash file compatible with md5sum(hashSUM). It has a gui and work on Linux and windows (the script should work even on Mac). Hash is computed while reading so sources file are read only once. The executables have been created using pp : it creates an executable similar to an autoextract-zip with the script, the perl engine and all libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    AHT (Ashiyane Hack Tools Ver) 1.1

    Perl Hacking Tools (BackTrack)

    ...It is For BackTrack This Script Contains This tools : Local File Disclource (LFD) Checker Scanning the whole netmask and returning IP and MAC BackConnect Tools Proxy Checker Reverse IP Add a User With Admin Access (Windows) Add a User With r00t Access (Unix) Grab Cpanel Users Remote Port Scanning With NetCat SQL Injection Scanner MD5 Hash Cracker (Online) Admin Page Finder Make Uploader With Echo Method (Linux Servers) Service Scanning BruteForce Services With Medusa And Hydra (Backtrack) Test Lfi With php:// Bypass Method Cms Analyzer (Beta Version) Server Scanning With Nmap Remote Command Execution Console Fck Editor Scanner
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7

    ESXi Forensic Imaging

    Create forensic images from vmware esxi using dd and netcat

    ...While this can make imaging a server easier, there is no tool to help a forensics investigator find the virtual machine they want to image, select the files they wish to image, and generate a hash and copy the image. This tool automates each of these steps and makes acquiring these images much easier while ensuring data integrity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    FFP (Feature frequency profile) is an alignment free comparison tool for phylogenetic analysis and text comparison. It can be applied to nucleotide sequences, complete genomes, proteomes and even used for text comparison.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    MD5-utils
    MD5-utils is a script for MD5 hash function manipulations. It can crypt one or more word(s) and try to crack one or more hash(es) using online servers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Collect! is a highly configurable debt collection software Icon
    Collect! is a highly configurable debt collection software

    Everything that matters to debt collection, all in one solution.

    The flexible & scalable debt collection software built to automate your workflow. From startup to enterprise, we have the solution for you.
    Learn More
  • 10

    yaib-daemon

    IP block list - can manage many thousands of IP addresses

    yaib-daemon is a resource-friendly blacklist daemon, designed to block many thousands of IP addresses. These blacklists are stored in hash tables. So only one or two iptables rules are needed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    BigSync is a simple utility that allows to incremetally backup huge files, particularly disk images for virtual machines and database files. BigSync stores these files efficiently in a compressed directory hash and is able to handle files of 4 TB
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Perl Password Generator using LINUX /dev/urandom, randomized by time signature and hash final masking. Usage: /usr/bin/perl mkpw-hash-alpha.pl [--hash=MD5/SHA1/SHA256/SHA512] [--length=integer<17] [--cycles=integer=1...3]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Config::IniFiles

    Use .ini-style configuration files from Perl

    A Perl module for reading ".INI" style configuration files. Provides Object-Oriented and tied hash usage styles.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Advanced Perl script for DES password cracking. Might be handy for password QA. Brut-force, load Unix passwd/shadow, multi hash crack, input/output file, save/resume cracking state.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Tokyo Cabinet is the successor of QDBM, a high performance database library similar to the DBM family. It also supports hash and B-tree databases and does not require any server process. The overall speed is improved compared to QDBM.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Robust Perl OO Module for Digest based Authentication leveraging DBI as a backend. This Performance oriented Hash Authentication Library is scalable from single pc to multi-database single signon www applications. Optionally uses Javascript and Cookies.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    simple daemon in perl, reads maillog, writes a db hash to be read by an MTA (Postfix currently supported) this can allow controlled email relaying
    Leader badge
    Downloads: 10 This Week
    Last Update:
    See Project
  • 18
    A unique flat-file database module, written in pure perl. True multi-level hash/array support, hybrid OO / tie() interface, cross-platform FTPable files, and quite fast. Can handle millions of keys/elements without significant slowdown.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Compares two values of any type and structure and returns true if they are the same. It does a deep comparison of the structures, so a hash of a hash of a whatever will be compared correctly. This is especially useful for writing unit tests!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    slipwire is intended to be a toolset for maintaining filesystem integrity using various hash algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next