Showing 77 open source projects for "hash"

View related business solutions
  • Modernize Your Lab with the #1 Rated LIMS Icon
    Modernize Your Lab with the #1 Rated LIMS

    Labs that need a powerful LIMS system

    Nothing is more critical to a lab’s success than the quality, security, and traceability of samples. The Lockbox LIMS system provides robust sample management functionality to laboratory professionals, giving them full visibility on every aspect of a sample’s journey, from accessioning to long-term storage.
    Learn More
  • All-in-One Inspection Software Icon
    All-in-One Inspection Software

    flowdit is a connected worker platform tailored for industry needs in commissioning, quality, maintenance, and EHS management.

    Optimize Frontline Operations: Elevate Equipment Uptime, Operational Excellence, and Safety with Connected Teams and Data, Including Issue Capture and Corrective Action.
    Learn More
  • 1

    DimerRemover

    Remove adapter dimers from NGS data

    This program can be used to count or remove adapter dimers in fastq files. Using a provided adapter sequence, it generates variations of this sequence and stores them in a hash table. The reads can then be directly matched against the hash. It is far more time efficient than doing alignment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Handwritten Signature SDK

    Java SDK useful to develop handwritten signature verification app

    Handwritten Signature SDK supports: dynamic time wrapping (DTW), extended regression (ER), signature sampling, direction hash and features extraction: see wiki for more info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    MD5Sum-gui

    MD5Sum-gui

    MD5sum is an utility that calculates 128-bit MD5 hash

    MD5sum is a little utility that helps you to calculate 128-bit MD5 hashes for a given string, as described in RFC 1321.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Revenssis Ethical Hacking Suite

    Revenssis Ethical Hacking Suite

    Fully featured network, wireless and web app pentesting suite.

    Nicknamed as the "Smartphone Version of Backtrack", Revenssis Penetration Suite is a set of all the useful types of tools used in Computer and Web Application security. Tools available in it include: Web App scanners, Encode/Decode & Hashing tools, Vulnerability Research Lab, Forensics Lab, plus the must-have utilities (Shell, SSH, DNS/WHOIS Lookup, Traceroute, Port Scanner, Spam DB Lookup, Netstat... etc). All these fitting in an application approx. 10MB (post installation).
    Downloads: 12 This Week
    Last Update:
    See Project
  • Office Ally: Healthcare Software for Your Medical Practice Icon
    Office Ally: Healthcare Software for Your Medical Practice

    We support healthcare organizations of all sizes with easy-to-use, affordable software solutions.

    Service Center by Office Ally is a trusted revenue cycle management platform used by over 65,000 healthcare organizations processing more than 350 million claims annually. With it, providers can verify patient eligibility and benefits, upload and submit claims, correct rejected claims, check claim status, and obtain remits. With multiple claim types and submission options, providers can easily submit claims to any payer from any practice management system. Transactions are secure, ensuring the confidentiality of sensitive patient information. With no needed implementation, providers can quickly and effortlessly streamline their billing processes, increase their financial performance, simplify medical billing, and reduce claim rejections for faster reimbursements.
    Learn More
  • 5

    innocence-java

    Replace text with POS equivalent text, in a reversible fashion.

    ...The project contains code to test input sentences for inclusion of words in the current vocabulary, and can create entries for new words as needed. The vocabulary has a "MD-5 hash" value to make sure that the share vocabulary file is identical for both sender and receiver. The software also contains a "bad-words" list of words that should never be generated in the text to be sent.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    FileHasher

    FileHasher help to get the hash code from any file

    FileHasher is a easy java application to get the hash code from any file. Files uploaded are stable code Git code are unstable
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    PasswordGenerator

    PasswordGenerator

    A free Password Generator written in Java

    next version is 2.4.6
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Files Hash code Verifier

    Files Hash code Verifier

    A tool to verify and generate MD5,SHA,CRC32 hash of multiple files

    A Security tool that will help to verify the hash codes of files . Currently,Our Hash Code verifier tool supports the following Hash types: MD5,SHA,CRC32. More details about the tool can be found in the project homepage.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    JPassword Recovery Tool

    JPassword Recovery Tool

    Password recovery tool for compressed archives and md5, sha-1/2 hashes

    ...if you have any ideas, bugs, tips/improvements and/or suggestions please dont hesitate to contact me NB AS OF V1.07 PLEASE MAKE SURE 'resources' FOLDER IS IN THE SAME DIRECTORY AS THE JPasswordRecoveryTool.jar Known Bugs(v1.09): -although md2 was selceted by default for hash recovery if you did not slected another value and reselect md2 it would use md5 by default
    Leader badge
    Downloads: 66 This Week
    Last Update:
    See Project
  • Arryved POS System Icon
    Arryved POS System

    Drive contagious loyalty with your guests and staff with a POS and Brewery Management system that helps run your craft brewery better.

    Arryved was built to help craft beverage makers thrive.
    Learn More
  • 10
    HashTool

    HashTool

    Easily calculate hash values.

    HashTool calculates the most common hash and hmac values of files and strings by using the "Bouncy Castle Java cryptography API".
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    Set Theory Relations in Java

    Java classes implementing set theory relation concepts

    ...The classes enable some ordered pairs to be stated, and will deduce all the other related ordered pairs implied by the relation's properties. There are implementations of transitive, reflexive-and-transitive, and symmetric-reflexive-and-transitive (equivalence) relations using hash sets and tree sets. The current version (0.1) has been tested but not substantially used. Feedback from use in the field will be welcomed, as will offers of collaboration to improve the deduction algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    A general purpose distributed hash table adapted for sequence analysis. This program searches for all maximal, exact unique n-mers from a given set of genomes. Originally, this program's primary use was to design resequencing microarrays.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    SmutDetect
    Development stop on the standalone application, ported as an autopsy module now: http://www.4ensics.co.uk/smutdetect4autopsy/ SmutDetect is a skin-tone image mining software which scans directories for images containing a specified percentage of skin-tones. It ranks (and filters) these images in various reports. Hash-export can be used to process the results in TSK/autopsy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Java File Checksum tool for calculating an hash (MD5, SHA-1, SHA-256, SHA-512).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A console application to find duplicated files in your hard disk that allows you to choose which duplicated files delete. It will work with a DB to store information of your files and compare them using a hash code like md5. Wait! I am still working
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    ANts P2P
    ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others.
    Downloads: 16 This Week
    Last Update:
    See Project
  • 17
    SGUtil Time Hash Server
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Concurrent hash map and linked list implementation of the ConcurrentMap interface, with predictable iteration order. This implementation differs from ConcurrentHashMap in that it maintains a doubly-linked list running through all of its entries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    jLikeRuby
    Java facades in Ruby style. You can use many ruby methods (first, each, join, collect, deleteIf..) for basic classes (Array, String, Hash...). These Java methods work as in Ruby. About 60% of code coverage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    jPhotoArchive is a simple system for managing a tiered series of archives for digital photographs. An MD5 hash is used to ensure file integrity from the original media through all archive tiers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Kotak
    Kotak is just another cracking tool which is based on Java. It is used to crack various types of hash functions with various types of attacks. It's developed to be as simple as possible, so that anyone can use this tool easily.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    The Cryptographic Hash Functions UNO Component for OpenOffice.org computes hashes (message digests) of text and files using following hashing algorithms: MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    ...The sorting is done by the capture date/time of the EXIF-Header. Image meta informations from EXIF-Header is stored in a database. Double files will be recognized by MD5-hash compare.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    It's a tool for testing HTTP servers and Web applications. It supports HTTP/HTTPS protocols, GET,POST and HEAD methods, HTTP proxies, refferes and cookies. It's like HTTP Debugger in network tool AccessDiver or HAS.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 25
    Login
    Login system! mySQL /JDBC Demonstrates the use of secured Hash functions in java
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB