Sha
CryptoNG is stable, reliable, and easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files by encrypting them with AES-GCM 256-bit authenticated encryption algorithm which simultaneously provides both data...
Platforms: Windows 8, Windows 7
License: Shareware | Cost: $9.79 USD | Size: 3.8 MB | Download (77): CryptoNG (32-bit) Download |
CryptoNG is stable, reliable, and easy to operate file encryption software for personal and professional security. It allows you to protect the privacy of sensitive files by encrypting them with AES-GCM 256-bit authenticated encryption algorithm which simultaneously provides both data...
Platforms: Windows 8, Windows 7
License: Shareware | Cost: $9.79 USD | Size: 3.8 MB | Download (74): CryptoNG (64-bit) Download |
Simple Conversions: ASCII to Binary, Binary to ASCII, ASCII to Hex, Hex to ASCII, Binary to Hex, Hex to Binary, Dec to Hex, Hex to Dec, Dec to Roman, Roman to Dec Network Tools: IP to Dec, Dec to IP, IP to Hex, Hex to IP, IP/Net Calculator, IPv6 Validator, IPv6 Compress, IPv6 Uncompress Non-Key...
Platforms: Mac
License: Shareware | Cost: $0.00 USD | Size: 225.28 KB | Download (42): Zyclo Crypt Download |
Commit view Commit/Parents/Tree SHA links File changes counts File Diffs Commit Tags and Refs File view Source Code Highlight Blame File History (log) Diff with local and HEAD Sidebar Branches Remotes Stashes Submodules Stage view Unstaged/Staged files Stage/Discard...
Platforms: Mac
License: Shareware | Cost: $0.00 USD | Size: 1.32 MB | Download (38): GitX (L) Download |
A set of very small categories for NSString, NSMutableString, NSArray, and NSDictionary that add a few sorely lacking features (isEmpty and containsKey: methods, for instance). These functions can be found in MPFunctions.h. . NSString *MPHexStringFromBytes(void *bytes, NSUInteger len) ....
Platforms: Mac
License: Freeware | Size: 10.24 KB | Download (40): MPTidbits Download |
With "File Hash" you can calculate the hash of a file and check the hash specified for a downloadable file. Calculate Hash ------------------------------------------------ Whether MD5, SHA-1 or SHA-512 - "File Hash" offers a huge variety of options for creating hashes. And the beauty of it is:...
Platforms: Mac
License: Commercial | Cost: $0.99 USD | Size: 204.8 KB | Download (40): File Hash Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 18.29 MB | Download (39): KeyMingler Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Shareware | Cost: $0.00 USD | Size: 5.92 MB | Download (42): sausra Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 12.35 MB | Download (34): gurbas Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.32 MB | Download (38): nulis Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Shareware | Cost: $0.00 USD | Size: 6.65 MB | Download (39): Plikledis Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.16 MB | Download (38): Vakar Download |
A file hasher written in java 1.6 capable of generating MD5, CRC32, SHA-1, SHA-256, SHA-384 and SHA-512 checksums of any file as well as comparing generated checksums. Requires Java Runtime Environment 1.6
Platforms: Mac
License: Freeware | Size: 1.69 MB | Download (43): HS File Hasher Download |
CheckIt is an extension that allows to select a checksum posted on a web site and compare it with the downloaded file or compare two files. It supports MD5, SHA-1, SHA-256, SHA-384 and SHA-512, which are detected automatically.
Platforms: *nix
License: Freeware | Size: 30.72 KB | Download (37): CheckIt Download |
The pycryptopp package contains Python wrappers for the Crypto++ library. RSA-PSS-SHA256 signatures, ECDSA(1363)/EMSA1(SHA-256) signatures, SHA-256 hashes, and AES-CTR encryption
Platforms: *nix
License: Freeware | Size: 1.06 MB | Download (39): pycryptopp Download |
dc3dd is a patched version of GNU dd to include a number of features useful for computer forensics. Many of these features were inspired by dcfldd, but were rewritten for dc3dd. Pattern writes. The program can write a single hexadecimal value or a text string to the output device for wiping...
Platforms: *nix
License: Freeware | Size: 2.83 MB | Download (37): dc3dd Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 478.93 KB | Download (56): Checksum-Aide Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 478 KB | Download (62): Checksum Aide Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 505 KB | Download (63): Checksum Aide 64 bit Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 408 KB | Download (61): Checksum Aide 64 Bit Portable Download |