Showing 41 open source projects for "npp-compare"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • AI-powered service management for IT and enterprise teams Icon
    AI-powered service management for IT and enterprise teams

    Enterprise-grade ITSM, for every business

    Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
    Try it Free
  • 1
    Mobile Verification Toolkit

    Mobile Verification Toolkit

    Helps with conducting forensics of mobile devices

    ...Using it requires understanding the basics of forensic analysis and using command-line tools. This is not intended for end-user self-assessment. If you are concerned with the security of your device please seek expert assistance. Compare extracted records to a provided list of malicious indicators in STIX2 format. Generate JSON logs of extracted records, and separate JSON logs of all detected malicious traces.
    Downloads: 29 This Week
    Last Update:
    See Project
  • 2
    JMD5Sum

    JMD5Sum

    Simple utility / application to verify integrity of any file and text.

    With JMD5Sum it is possible to calculate and/or compare two MD5 files and/or texts in just a few clicks. Once you have chosen the file or entered the text, copy the MD5 obtained to the clipboard, choose another file or insert another text, compare the value obtained by pasting the previously copied value from the clipboard (with Ctrl-v) in the appropriate field. JMD5Sum also shows the characters one by one of the MD5 obtained, to facilitate reading.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Seed Tag

    Seed Tag

    Hide your SEED phrase in a fake SEED phrase

    ...and use temporary os system 1 paste seed phrase as string into memo 2 enter three keys 3 pack it 4 copy packed seed as string 5 paste packed seed into memo 6 unpack it 7 compare unpacked seed wtih original seed 8 profit
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Hash Latch
    ...This approach allows the hash latch to protect itself from forged keys and also enables you to put the same key into multiple safes without the recipients of these safes knowing they have the same key (even if they compare their ciphertexts). Moreover, the hash latch verifies the integrity of a key after decrypting it (just in case). You can read the tutorial about it on Instructables: https://www.instructables.com/Hash-Latch/
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 5

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    This project offers an Excel spreadsheet, available for download through the Files tab (above). The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the files previously found on that data drive, or on a backup drive. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    FullDiskHash

    FullDiskHash

    Get and save hashes of files in a drive or folder.

    Get and save hashes (MD5 and SHA256) of files in a drive or folder. In later stages of the project, it will be possible to compare the hashes with previous scans to check which files have been changed. Additional information such as the author of the software or its certification in the case of executables or libraries is also read.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    jjb

    jjb

    A chrome extension that helps you automatically apply for Jingdong

    ...Since Beijing Price Insurance is not commercial software, it depends on your support to continue. Beijing Price Insurance compressed the code to reduce the size when it was released, please run yarn dev to compare. Beijing Price Insurance does not support Ubuntu and similar systems temporarily, which may cause the function to be unavailable or the memory usage to be too large. It is not recommended to use it under Ubuntu.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    BitShade

    BitShade

    AES Cipher, Base64 encoder, SHA calculator

    BitShade is a graphic utility to encrypt/decrypt with AES, base64 encode/decode, calculate the SHA checksum. It is cross platform, written in Java.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    NASH OS

    NASH OS

    Nash Operating System for Modern Ecommerce

    The all-built-in-one, automatic, ready-to-go out-of-box, easy-to-use state-of-the-art, and really awesome NASH OS! Over 25,000+ flexible features and controls and all scalable!! The most powerful solution ever built to instantly deliver new heights of online ecommerce enterprise to you.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10

    APIthet

    An Application to security test RESTful web APIs.

    APIthet is an application to security test RESTful web APIs. Assessing APIs help in detecting security vulnerabilities at an early stage of the SDLC. Compare this with assessing an Android application that uses APIs on a backend server. This kind of assessment happens at a much later phase of the SDLC. Even worse, it does not necessarily touch all the APIs. That's not all. You specify one of the JSON parameters as random. This helps set a unique value for a specific JSON parameter in an API. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    With this tool you are able to test different hashes: - MD2 - MD5 - SHA1 - SHA224 - SHA256 - SHA384 - SHA512 Recommended Java 8 For any questions you may use the ticketing system .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    360-FAAR  Firewall Analysis Audit Repair

    360-FAAR Firewall Analysis Audit Repair

    360-FAAR Analyze FW1 Cisco Netscreen Policy Offline Using Config/Logs

    360-FAAR (Firewall Analysis Audit and Repair) is an offline, command line, firewall policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in Checkpoint dbedit, Cisco ASA or ScreenOS commands, and its one file! Read Policy and Logs for: Checkpoint FW1 (in odumper.csv / logexport format), Netscreen ScreenOS (in get config / syslog format), Cisco ASA (show run / syslog format), 360-FAAR compares firewall policies and uses CIDR and text filters to split rulebases / policies into target sections and identify connectivity for further analysis. 360-FAAR supports, policy to log association, object translation, rulebase reordering and simplification, rule moves and duplicate matching automatically. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    JChecksum

    JChecksum

    MD5 Checksum Tool

    This tool checks the integrity of files. It is very important if you don’t want your computer to get infected with viruses and malware. Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files. This tool enables you to verify the file integrity of the downloaded...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Password Guessing Framework

    Password Guessing Framework

    A Framework for Comparing Password Guessing Strategies

    The Password Guessing Framework is an open source tool to provide an automated and reliable way to compare password guessers. It can help to identify individual strengths and weaknesses of a guesser, its modes of operation or even the underlying guessing strategies. Therefor, it gathers information about how many passwords from an input file (password leak) have been cracked in relation to the amount of generated guesses. Subsequent to the guessing process an analysis of the cracked passwords is performed. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    zxcvbn

    zxcvbn

    Low-budget password strength estimation

    ...LUDS remains ubiquitous despite being a conclusively burdensome and ineffective security practice. zxcvbn is an alternative password strength estimator that is small, fast, and crucially no harder than LUDS to adopt. Using leaked passwords, we compare its estimations to the best of four modern guessing attacks and show it to be accurate and conservative at low magnitudes, suitable for mitigating online attacks. We find 1.5 MB of compressed storage is sufficient to accurately estimate the best-known guessing attacks up to 105 guesses, or 104 and 103 guesses, respectively, given 245 kB and 29 kB. zxcvbn can be adopted with 4 lines of code and downloaded in seconds. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Difftree has moved to GitHub (https://github.com/rondilley/difftree) dt is short for difftree and it is a fast directory comparison tool for security incident response when you don't have time to run tools like tripwire or osiris.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    SourceAFIS

    SourceAFIS

    Fingerprint recognition library (.NET port)

    SourceAFIS is a software library for human fingerprint recognition. It can compare two fingerprints 1:1 or search a large database for matching fingerprint. It takes raw fingerprint images on input and produces matching score on output. Click the website link above for more info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    Domain Analyzer Security Tool

    Finds all the security information for a given domain name

    Domain analyzer is a security analysis tool which automatically discovers and reports information about the given domain. Its main purpose is to analyze domains in an unattended way.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    WinMd5Checksum

    WinMd5Checksum

    Calculating and comparing MD5 checksums, calculating SHA256 hash

    You can calculating md5 hashsums, comparing files and hashsums in pairs. If you have backups of one file and you have a md5 hashsum, you can compare your backups against this md5 hashsum. Calculating SHA256 hashes too. This repository will no longer updated! Please take a look at this url: https://github.com/tualatin/winmd5checksum
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Botnet Detectors Comparer

    Compares botnet detection methods

    ...This program computes all the error metrics (TPR, TNR, FPR, FNR, Precision, Accuracy, ErrorRate, FMeasure1, FMeasure2, FMeasure0.5) and output the comparison results. It also ouputs a png plot. The program can compare in a flow-by-flow basis, or it can apply our new botnet detection error metrics, that is time-based, detects IP addresses instead of flows and it is weighted to favor sooner detections. See the paper for more details.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    SteghideGUI

    Steghide GUI is perfect C++/Qt app for embedding and extracting data

    Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests. SteghideGUI is Qt GUI with various features. It supports steganography capacity counter (also supports UTF8 and compression). It serves like a educational demonstration of embedding process. You can also view cover and stegogram in custom image viewer.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    SJE

    To develop solutions for store and secure files in any hosts

    SJE is a freeware program to split, join, encrypt, decrypt files. Fast, small and safe to change MD5 Check Sum. The program is available on Windows. Note : Please use SJE ver 2.0 or more to encrypt and dencrypt. Ver 1.0 have many bugs and unstable.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    egrsa

    egrsa

    rsa-elgamal comparison

    compare time of process between rsa and elgamal algorithm used to encryption and digital signature.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    chksm-chkfile

    chksm-chkfile

    Windows MD5/SHA-1/SHA-256 file hashes calculator.

    Calculate MD5, SHA-1, SHA-256 checksum hashes from a specific file, and compare these values with a given string. Accept one filename as parameter. Functionalities : - automatically retrieve text from Windows clipboard and compare it. - 32 & 64 bits windows platforms supported - Installation (Add to file context menu) - Uninstallation Requirements: - Microsfot .NET Framework 2.0 Files: chksm-chkfile.exe MD5: c0b7761deeb7d7dc45aa04726309d4ca SHA1: b19e8013ce1ea6c297c682a9ad5940024f8ff68e SHA256: a539d86960ec28429d98fc619a213efd8435d4c340f78c4d07bb1494ace82ce5 chksm-chkfile-src.zip MD5: f60acabb5a5e3e0e930b74e918e20d71 SHA1: 05ec2018fe4de677b1f27b498be3b61afe5f15c1 SHA256: e5c9caba615066c539a7ff523ea1a89af6dcf1665fd47362dd95bc8adf88fe65
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Quick Check

    Quick Check

    Quick Check is a small MD5 comparison program.

    ...First you enter the hash of the file you got from where you downloaded, next click the button and browse to the downloaded file and the program will retrieve the MD5 hash and compare. If they match, the label at the bottom left will let you know, same on the contrary. Please read the README after you download this as it contains some decent info as well. Thank you!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB