With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Bright Data - All in One Platform for Proxies and Web Scraping
Say goodbye to blocks, restrictions, and CAPTCHAs
Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
The 7-Zip derivative intended for the modern Windows experience
NanaZip is an open source file archiver intended for the modern Windows experience, forked from the source code of well-known open source file archiver 7-Zip.
FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.
...://sourceforge.net/projects/jdiskmark/files/jDiskMark-0.5.1.msi/download
Verify your download with SHA-256 Hash: D8EE4181D42B0CEF4806BF903EE9EF44722DB54C6C7F9EEBAC8BE119BB7AF753
Instructions to verify file SHA-256 signature:
https://sourceforge.net/p/jdiskmark/wiki/%20Verifying%20SHA-256%20Hash%20on%20Windows%20with%20PowerShell/
ZIP releases:
* v0.5-v0.5.1 requires Java 21
* v0.1-v0.4 requires Java 8
NOTE: run as administrator or w sudo to automatically drop disk cache
NO LONGER MAINTAINED, NO LONGER SUPPORTED
Manifest Maker is a graphical Python application which takes a file or group of files and creates a plain text manifest list of each item. The manifest includes the file name (including directory structure) as well as a checksum of the file.
Build a scalable voice experience with the API that's connecting millions around the world.
With Twilio Voice, you can build unique phone call experiences with one API, to create, receive, control and monitor calls with just a few lines of code. Create an engaging voice experience that you can quickly scale and modify with a wide array of customization options and resources.
Helps you to verify the integrity of the files.
Hash Calculator for files.
Using:
CRC32
MD5
RIPEMD-160
SHA-1
SHA-256
SHA-384
SHA-512
Update:
Added CRC32
Now supports big files (more then 4Gb)
*Requires .NET 4.5
A free "on-the-fly" transparent disk encryption program for PC & PDAs.
An upstream source site housing the original files for this mirror is no longer available.
With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.
Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
This is a more secure file encryption program which uses SERPENT cipher and WHIRLPOOL+SHA-256 hash functions in key creation and for integrity checking.
Looker is an enterprise platform for BI, data applications, and embedded analytics that helps you explore and share insights in real time.
Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
The MFV (Multiple File Verifier) project has been designed to improve the sfv standard with new hash standards. Instead of the 32 bit CRC (SFV) algorithm,one of the new algoritms such as MD5 SHA-1 SHA-256 SHA-384 and SHA-512 can be used by users' choice