Showing 12 open source projects for "sha256"

View related business solutions
  • Marketing automation for any business | ActiveCampaign Icon
    Marketing automation for any business | ActiveCampaign

    Your team of AI agents handles email, SMS, WhatsApp and more for you

    Active Intelligence revolutionizes how you work. You guide direction while AI handles execution, acts on insights, and shows you the path forward. It's how marketing should be.
    Learn More
  • Component Content Management System for Software Documentation Icon
    Component Content Management System for Software Documentation

    Great tool for serious technical writers

    Paligo is an end-to-end Component Content Management System (CCMS) solution for technical documentation, policies and procedures, knowledge management, and more.
    Learn More
  • 1
    v2ray-rules-dat

    v2ray-rules-dat

    V2Ray routing rules file enhanced version, which can replace V2Ray

    v2ray-rules-dat is a repository that compiles and distributes enhanced rule data (domain lists, geo-IP/geo-domain data, block/proxy/detect lists) intended for use with tools like V2Ray, Xray-core, and similar network/proxy frameworks. The dataset serves as an alternative or supplement to official geoip/ geosite data files, often providing more up-to-date, community-curated entries — enabling better routing, blocking, or traffic management when using those proxy tools. The repository is...
    Downloads: 45 This Week
    Last Update:
    See Project
  • 2
    RHash
    RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BTIH, Tiger, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool.
    Leader badge
    Downloads: 1,052 This Week
    Last Update:
    See Project
  • 3
    AndroidKeyGen

    AndroidKeyGen

    Generate Android signature certificates easier and faster.

    Android APK Signing Certificate Generator, easier and faster to generate Android signing certificate. Implemented in C# (.Net Framework), does not depend on the Java environment. https://github.com/lalakii/AndroidKeyGen
    Downloads: 5 This Week
    Last Update:
    See Project
  • 4
    Name-That-Hash

    Name-That-Hash

    Identify MD5, SHA256 and 300+ other hashes

    Name-That-Hash is a modern hash identification system that tells you what type of hash you are looking at, supporting MD5, SHA-256, and more than 300 other hash types. It is designed as a successor and improvement to older tools like HashID and Hash-Identifier, focusing on up-to-date hash databases and better usability. One of its core ideas is popularity-aware ranking: when you feed in a hash, it prioritizes likely real-world types such as NTLM over obscure ones like Skype hashes, instead...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The most trusted software in construction Icon
    The most trusted software in construction

    HCSS is the gold standard software solution for winning, planning, and managing construction projects by connecting the office to the field.

    HCSS provides easy-to-use software built for construction companies that want to win more work, work smarter, and boost profits. For nearly 40 years, we've helped heavy civil contractors, infrastructure builders, and utility companies improve operations, from estimating and project management to field tracking, equipment maintenance, and safety. Tools like HeavyBid, HeavyJob, and HCSS Safety are built for the field and designed to work together, giving your team real-time visibility, tighter cost control, and better job outcomes. With 45+ accounting integrations and customizable APIs, HCSS fits seamlessly into your tech stack. We regularly update our software based on feedback from real crews, ensuring it fits the way your team works. Backed by award-winning 24/7/365 support and a proven implementation process, HCSS helps reduce risk, cut inefficiencies, and deliver fast ROI. If you're ready to grow your business and gain a competitive edge, HCSS is the partner that gets you there.
    Learn More
  • 5
    KaHaShEr

    KaHaShEr

    File checksum generator and verifier.

    KaHaShEr is an application to check the integrity of a file using MD5, SHA1, SHA256 and SHA512 checksum. Designed to be smart and easy to use, it includes a feature that can detect a hexadecimal value in the clipboard and automatically perform the verification while notifying you with a very expressive sound of the outcome of this verification.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    File Checksum Utility

    File Checksum Utility

    Calculate MD5, SHA1, SHA256 and SHA512 Hashes

    This software allows to generate MD (Message Digest) and SHA hashes from a file or files or files in a directory. Checksum is an value calculated from a content of file by special algorithm. You can also verify the file integrity of the downloaded document or program. File Checksum Utility is very easy to use. From the graphical user interface, choose the file from your computer storage. The tool calculate and display checksum values. File Checksum Utility is a free software (Freeware)...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 7
    sjcl

    sjcl

    Stanford Javascript Crypto Library

    ...The minified version of the library is under 6.4KB compressed, and yet it posts impressive speed results. SJCL is secure. It uses the industry-standard AES algorithm at 128, 192 or 256 bits; the SHA256 hash function; the HMAC authentication code; the PBKDF2 password strengthener; and the CCM and OCB authenticated-encryption modes. Just as importantly, the default parameters are sensible: SJCL strengthens your passwords by a factor of 1000 and salts them to protect against rainbow tables, and it authenticates every message it sends to prevent it from being modified. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Sudoku Game Solver Generator

    Sudoku Game Solver Generator

    Standalone Complete Sudoku puzzle Game Solver Generator for Windows

    This is the most complete and standalone Sudoku puzzle suite for Windows. It includes comfort playing with undo steps and powerful Sudoku generator with different difficulty levels. Also you can create Sudoku game manually and print it on an A4/Letter paper. Tutorial mode with solving hints for newbies is included too. Also there is High Score table and built-in timer for professional players. The Sudoku generation algorithm used by this app is my ultimate proud. Primarily it was based on...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    XOR encrypt v2.0

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    ...This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. The password you provide is hashed ( SHA256 ) and saved into the encrypted file to check if the password provided is correct.This algorithm has limitations in general more the numbers of relative characters in the password to plaintext more secure will be the encryption. XOR encrypt has a 3.5 of 5 editors rating from softpedia http://www.softpedia.com/get/Security/Encrypting/XOR-Encrypt.shtml
    Downloads: 4 This Week
    Last Update:
    See Project
  • Track time for payroll, billing and productivity Icon
    Track time for payroll, billing and productivity

    Flexible time and billing software that enables teams to easily track time and expenses for payroll, projects, and client billing.

    Because time is money, and we understand how challenging it can be to keep track of employee hours. The constant reminder to log timesheets so your business can increase billables, run an accurate payroll and remove the guesswork from project estimates – we get it.
    Learn More
  • 10
    Advance MD5 Checksum

    Advance MD5 Checksum

    This software allows users to generate the MD5 and SHA Hash Checksum.

    ...It can also be useful to check if an executable file is legit, in other words, if it is the official release from the offical author. Hashes supported are: MD5, SHA1, SHA256, SHA384 and SHA512. It is possible to scan all files of a folder with subfolders selectable (Recursive) and create a report with file checksum (MD5/SHA1) of all files with filename and file size. Other features are: compare a file with an MD5 hash and compare two files to know if files are different or equal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Hash Monster
    A versatile gui and console application capable of generating and comparing hashes using a variety of popular hashing libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Katyusha

    Katyusha

    Multiple Payload Launcher System

    Latest Release: v07.01.2024.0 | http://adfoc.us/700817100065016 SHA256(.zip): 5e138cb20f017e958b30d3b548e1de4447c6affae53c4eabb63c38c0a9aa832d SHA256(.exe): f064ee75e6f53b4e5448be794d1540fcba60a4f37aa12e2dd97aad6be5a2d5b3 Github (Don't trust us? Build the exe your self!): https://github.com/GenesisFoundationCore/Katyusha Katyusha, Multiple Payload DDoS Software, that uses images / gif files as Payloads in-order to flood a Group Chat / Discord Server with Messages and Images, Using Windows Clipboard it copies the "Payload" images to your clipboard so YOU don't have to. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB