Showing 19 open source projects for "secure hash algorithm"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • 1
    nkn

    nkn

    Official Go implementation of NKN full node

    NKN (New Kind of Network) is a blockchain-based network infrastructure that utilizes a novel consensus mechanism to facilitate decentralized data transmission. By incentivizing network participants with tokens, NKN aims to create a more open, efficient, and secure internet. Its architecture supports a wide range of applications, from messaging to content delivery.​
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Comeonin

    Comeonin

    Password hashing specification for the Elixir programming language

    Comeonin is the long-standing password-security library for Elixir that standardizes secure hashing and verification practices in Phoenix and Plug applications. It provides a uniform interface for modern algorithms such as Argon2, Bcrypt, and PBKDF2 (implemented in companion packages), along with guidance for salts, cost factors, and timing-safe comparisons. The library’s helpers make it straightforward to add registration and login flows that resist brute-force and side-channel attacks....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    PeaZip

    PeaZip

    Free Zip software and Rar extractor

    PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX. Create: 7Z, ARC, Brotl, BZip, GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP, Zstandard files and more Open and extract 200+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives...
    Leader badge
    Downloads: 1,518 This Week
    Last Update:
    See Project
  • 4
    HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloud-based help desk software with ServoDesk Icon
    Cloud-based help desk software with ServoDesk

    Full access to Enterprise features. No credit card required.

    What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
    Try ServoDesk for free
  • 5
    GoldBug - Encrypted Communications

    GoldBug - Encrypted Communications

    Chat Messenger. E-Mail-Client. Websearch. Filetransfer.

    GoldBug is a decentralized & secure communication suite that offers an integrated e-mail client, an instant messenger & a file transfer. Also included is an URL-RSS-DB & a p2p web search. Current vers. w/ McEliece Algorithm. GoldBug has been 2013 - 2023 ten years just another Graphical User Interface of the Spot-On Encryption Suite. Main GUI features: Minimal & colorful Interface with Tabs in the East.
    Downloads: 13 This Week
    Last Update:
    See Project
  • 6
    XSIBackup-Classic

    XSIBackup-Classic

    Local and over IP backups for ©VMWare ©ESXi 5.1 to 6.7

    ...Crontab with configurable disk space autoprovision, set the room you want to reserve for your backups and rotate them. Full backups may be done with vmkfstools or by means of Rsync and its Delta algorithm (read: https://33hops.com/blog_xsibackup-rsync-considerations.html), to a local datastore or over TCP/IP tunneled through SSH, so any transfer over IP is secure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    DuplicatedFile

    DuplicatedFile

    Find out duplicate files

    Discovers duplicate files within a folder or disk and saves the list of discovered files to a file.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    clzw

    clzw

    Implementation of LZW compression algorithm in C

    Simple, fast implementation of LZW (Lempel–Ziv–Welch) data compression algorithm in C. - Console encoder/decoder tools - OS independent - Could be used in embedded projects - Works with raw code-stream LZW features: - Hardcoded dictionary size - Variable code size - Code search is performed by hash table and embedded in dictionary linked lists (encoder) - No dynamic memory allocation
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    Whirlpool File Checker
    ...So, it only works on NTFS volumes. With that, you can rename, copy or move your files (to another NTFS volume) without losing the hashes, and without needing to do anything else. The Whirlpool algorithm is a strong 512-bit hash function. This tool uses several optimized implementations with SSE4.1 or SSE2 instructions when available. Each folder is recursively processed. You can use drag-and-drop, mix files and folders, pause and resume. 64-bit: https://sourceforge.net/projects/whirlpoolfilech/files/0.5/WFileCheck64.exe 32-bit: https://sourceforge.net/projects/whirlpoolfilech/files/0.5/WFileCheck32.exe At first use, please let the integrated benchark determine the fastest procedure for your hardware. ...
    Leader badge
    Downloads: 94 This Week
    Last Update:
    See Project
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 10

    Gutmann Algorithm Secure File Deletion

    Using Gutmann method for securely deleting files in Windows.

    Gutmann method uses 35 passes over the region to be deleted, 8 of them are Pseudo-random. Considered by some to be highly effective for preventing file recovery. Requires .NET Framework 4.0 --- Systems & Safety Establishment https://sarab.me Source Code available in c# with comments. Reference: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
    Downloads: 5 This Week
    Last Update:
    See Project
  • 11
    Manifest Maker

    Manifest Maker

    NO LONGER MAINTAINED

    NO LONGER MAINTAINED, NO LONGER SUPPORTED Manifest Maker is a graphical Python application which takes a file or group of files and creates a plain text manifest list of each item. The manifest includes the file name (including directory structure) as well as a checksum of the file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Advanced Checksum Verifier Utility
    Advanced CVU is an open source GUI software for calculating checksum and verifying file integrity. Supported checksums: - MD5 (Message Digest 5) - SHA-1 (Secure Hash Algoritm) - SHA-256 (Secure Hash Algoritm) - SHA-512 (Secure Hash Algoritm) - CRC32 (Cyclic Redundancy Check) - Adler-32 (RFC 1950) Java Runtime Environment (JRE) 1.8 must be installed for proper running.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Checksum Directory

    Checksum Directory

    Check some checksum!

    A secure and centralized way to get checksums of common downloads. You will find the usual MD5 hash, but also the newer and more secure hashes like SHA-1, SHA-256 and even SHA-512. If the filesize and all up to four hashes match, you should be save to use that downloaded file.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    qlsdup

    GUI based lightweight duplicate file finder / remover.

    ...This is basically a reimplementation of dupfinder as: it doesn't compile on my computer, the executable won't work either, the projects seems dead and I didn't wanna work through the original code. So Look'n'Feel should be somewhat the same, though some changes have been made. Algorithm is simple and suitable for large file sets with few differences: basic set of duplicate candidates is determined by file size, then candidates are compared byte-wise. So for files which don't start to differ by growing at the tail it reduces read operations greatly compared to hash-based comparision (i.e. test case: 40GB of files, 16GB RAM, many differences: initial compare (uncached by OS) around 300sec, subsequent compare (relevant file parts cached by OS) ca. 2sec) Note: this program is not related to lsdup
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 17
    This software is used to delete files securely in the Linux operating system using low level system calls.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Ermdia is a yet another implementation of Kademlia, which is one of the algorithm of ditributed hash table (DHT), in Erlang. This software is lightweight, fast and easy to understand since an amount of source code is quite small.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    The MFV (Multiple File Verifier) project has been designed to improve the sfv standard with new hash standards. Instead of the 32 bit CRC (SFV) algorithm,one of the new algoritms such as MD5 SHA-1 SHA-256 SHA-384 and SHA-512 can be used by users' choice
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next