Sha 256
Computes the MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digest for any number of files while optionally recursively digging through the directory structure. Can also match input files against lists of known hashes in a variety of formats.
Platforms: Windows, Mac, BSD, Solaris, Linux
License: Freeware | Size: 1.35 MB | Download (54): md5deep and hashdeep Download |
Sha4j is a one class implementation of SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 algorithms.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 105.16 KB | Download (47): Sha4J Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 478.93 KB | Download (56): Checksum-Aide Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 478 KB | Download (62): Checksum Aide Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 505 KB | Download (63): Checksum Aide 64 bit Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 408 KB | Download (61): Checksum Aide 64 Bit Portable Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 390 KB | Download (37): Checksum Aide 32 Bit Portable Download |
Digest::SHA::PurePerl is a Perl implementation of SHA-1/224/256/384/512. SYNOPSIS In programs: # Functional interface use Digest::SHA::PurePerl qw(sha1 sha1_hex sha1_base64 ...); $digest = sha1($data); $digest = sha1_hex($data); $digest = sha1_base64($data); $digest = sha256($data);...
Platforms: *nix
License: Freeware | Size: 30.72 KB | Download (93): Digest::SHA::PurePerl Download |
The professional program to recover the passwords for user hashes. The range of hashes supported include: MySQL, MySQL5, DES(Unix), MD4, MD4(HMAC), MD5, MD5(HMAC), MD5(Unix), MD5(APR), SHA-1, SHA-1(HMAC), SHA-256, SHA-384, SHA-512, Domain Cached Credentials, Haval-128, Haval-160, Haval-192,...
Platforms: Windows
License: Demo | Cost: $60.00 USD | Size: 15.46 MB | Download (298): PasswordsPro Download |
The MarshallSoft AES Library for C/C++ (AES4C) is a toolkit that allows software developers to easily implement strong
encryption and decryption into a Windows C/C++, Visual C++, .NET or Visual C# application.
AES4C is a component (DLL) library that provides an easy interface to...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Shareware | Cost: $115.00 USD | Size: 548.48 KB | Download (2076): MarshallSoft C/C++ AES Library Download |
The MarshallSoft AES Visual FoxPro Library (AES4FP) is a toolkit that allows software developers to easily implement strong
encryption and decryption into a Windows FoxPro application.
AES4FP is a component (DLL) library that provides an easy interface to to perform encryption and...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Shareware | Cost: $115.00 USD | Size: 265.38 KB | Download (124): MarshallSoft Visual FoxPro AES Library Download |
The MarshallSoft AES Delphi Library (AES4D) is a toolkit that allows software developers to easily implement strong encryption and decryption into a Windows Delphi or .NET application.
AES4D is a component (DLL) library that provides an easy interface to to perform encryption and decryption...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Shareware | Cost: $115.00 USD | Size: 320.19 KB | Download (3022): MarshallSoft Delphi AES Library Download |
It currently implements these SHA algorithms: SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512.
Platforms: JavaScript
License: Freeware | Size: 20.48 KB | Download (43): jsSHA Script Download |
jsSHA is a javascript implementation of the entire family of SHA hashes as defined in FIPS 180-2 (SHA-1, SHA-224, SHA-256, SHA-384, and SHA-512). Despite javascript not natively supporting 64-bit operations, SHA-384 and SHA-512 are even implemented! jsSHA is also 100% cross-browser compatible....
Platforms: *nix
License: Freeware | Size: 20.48 KB | Download (38): jsSHA by Brian Turek Download |
The MarshallSoft AES Visual Basic Library (AES4VB) is a toolkit that allows software developers to easily implement strong encryption and decryption into a Windows Visual Basic, .NET, or VBA application.
AES4VB is a component (DLL) library that provides an easy interface to to perform...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Shareware | Cost: $115.00 USD | Size: 359.1 KB | Download (73): MarshallSoft Visual Basic AES Library Download |
QuickHash Library allows Windows developers to perform in their applications hash, checksum and HMAC calculations for memory blocks, strings, blobs, streaming data and single files.
QuickHash Library was designed to be fast, flexible, intuitive and extremely easy to use.
Major features:
-...
Platforms: Windows
License: Shareware | Cost: $149.95 USD | Size: 410 KB | Download (155): QuickHash Library Download |
XySSL is a cryptographic library written in C. It currently features several ciphers (AES, Triple-DES, and ARC4), hash functions (MD{2,4,5}, SHA-1, and SHA-256), and RSA and X.509 reading support. XySSL project also implements the Secure Sockets Layer version 3 protocol (SSLv3), as well as the...
Platforms: *nix
License: Freeware | Size: 276.48 KB | Download (176): XySSL Download |
Jacksum KDE Konqueror Integration installs features of Jacksum 1.7.0 at the KDE Konqueror (and uninstalls it again if you like). Jacksum is a free and platform independent software for computing and verifying checksums, CRCs and message digests (known as hash values and fingerprints). "Jacksum"...
Platforms: *nix
License: Freeware | Size: 194.56 KB | Download (95): Jacksum KDE Konqueror Integration Download |
Febooti fileTweak Hash & CRC is a freeware hash / CRC calculator. Compute hash fingerprint / CRC checksum from any provided file. Supported hash / CRC formats: CRC32, MD2, MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, WHIRLPOOL and Tiger-192.
Platforms: Windows
License: Freeware | Size: 778.24 KB | Download (63): Febooti fileTweak Hash & CRC Download |
Simple file and text hash value calculator. Supports more than 130 hash functions including: AP Hash, Adler 16, Adler 32, Adler 8, BKDR Hash, BP Hash, CK SUM MPEG-2, CK Sum, CRC DNP, CRC-16, CRC-16 (IBM), CRC-16 (Kermit), CRC-16 (Modbus), CRC-16 (Sick), CRC-16 (X25), CRC-16 CCITT (0x1D0F), CRC-16...
Platforms: Windows
License: Freeware | Download (94): Easy Hash Download |