Cryptographic Hash
Calculator of Cryptographic Hash is a handy and reliable utility designed to compute the cryptographic hash of text and files.
Simply drag and drop files (or type the text) in this calculator and hash string for the files (or for entered text) will be immediately displayed. Great tool for...
Platforms: Windows, 2003, Windows Vista, 2008, 7, 7x64
License: Freeware | Download (422): Calculator of Cryptographic Hash Download |
Cryptnos will provide users with an application that will help you generate strong, pseudo-random passwords using cryptographic hashes.
Cryptnos combines a unique "site token" such as a website domain name with a master password and runs this data through a cryptographic hash algorithm to...
Platforms: Windows
License: Freeware | Size: 799 KB | Download (445): Cryptnos Download |
Hashr is a simple web utility that tranforms any given string into an cryptographic hash of the chosen algorithm. You can choose between 40 or more different algorithms. It was written in PHP and some javascript effects. What is it for? Well, mainly it was developed by me, for me. It's a tool I...
Platforms: *nix
License: Freeware | Size: 10.24 KB | Download (37): hashr Download |
Pure managed C# implementation of well-known cryptographic hash functions such as SHA-family (SHA0, SHA1, SHA2), MD-family (MD2, MD4, MD5), RIPEMD, Tiger, Haval, Snefru and others.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 134.71 KB | Download (58): ACryptoHash.Net Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 18.29 MB | Download (39): KeyMingler Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 12.35 MB | Download (34): gurbas Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.32 MB | Download (38): nulis Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.16 MB | Download (38): Vakar Download |
Appnimi MD2 Decrypter helps in decrypting any MD2 hash string. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true MD2 Decrypter available in the market. Above all it is FREE.
The MD2 Message-Digest Algorithm is a cryptographic hash...
Platforms: Windows, Windows 8, Windows 7
License: Freeware | Size: 999 KB | Download (530): Appnimi MD2 Decrypter Download |
Appnimi MD5 Decrypter helps in decrypting any MD5 hash. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true MD5 Decrypter available in the market. Above all it is FREE.
The MD5 message-digest algorithm is a widely used cryptographic...
Platforms: Windows 8, Windows 7, Windows
License: Freeware | Size: 1.18 MB | Download (517): Appnimi MD5 Decrypter Download |
Appnimi SHA256 Decrypter helps in decrypting any SHA256 hash. In appropriate infrastructure it works at a speed of more than 1 million words per second. One of the fastest true SHA256 Decrypter available in the market. Above all it is FREE.
The Secure Hash Algorithm is one of a number of...
Platforms: Windows, Windows 8, Windows 7
License: Freeware | Size: 1.02 MB | Download (595): Appnimi SHA256 Decrypter Download |
Visprint project makes fractal fingerprint png images based on the contents of any file. The image will be different for almost every file with even slightly different contents. Visprint uses the IFS fractal generation process, pioneered by Michael Barnsley. It is a way to create images which are...
Platforms: *nix
License: Freeware | Size: 14.34 KB | Download (107): Visprint Download |
Mail::DKIM::Signature module encapsulates a DKIM signature header. CONSTRUCTORS new() - create a new signature from parameters my $signature = new Mail::DKIM::Signature( [ Algorithm => "rsa-sha1", ] [ Signature => $base64, ] [ Method => "relaxed", ] [ Domain => "example.org", ] [...
Platforms: *nix
License: Freeware | Size: 47.1 KB | Download (98): Mail::DKIM::Signature Download |
The Microsoft Safety Scanner is a free downloadable security tool that provides on-demand scanning and helps remove viruses, spyware, and other malicious software. It works with your existing antivirus software.
The Microsoft Safety Scanner, expires 10 days after being downloaded. To rerun a...
Platforms: Windows
License: Freeware | Size: 68.5 MB | Download (450): Microsoft Safety Scanner Download |
Bitcache is a distributed content-addressable storage (CAS) system. It provides repository storage for bitstreams (colloquially known as blobs) of any length, each uniquely identified and addressed by a digital fingerprint derived through a secure cryptographic hash algorithm.Installation - Copy...
Platforms: Windows, Mac, *nix, PHP, BSD Solaris
License: Freeware | Download (55): Bitcache Download |
This module implements an import hook for verifying Python modules before they are loaded, by means of cryptographically-signed hashes. It is compatible with PEP 302 and designed to complement the code-signing functionality of your host OS (e.g. Microsoft Authenticode, Apple OSX Code Signing)...
Platforms: *nix
License: Freeware | Size: 40.96 KB | Download (44): signedimp Download |
plone.session implements secure session management for Zope sites. In its default configuration plone.session uses an HMAC SHA-256 secure cryptographic hash to authenticate sessions. The hash is generated using the userid and a secret stored in the PAS plugin. Otherwise, the cookie format is...
Platforms: *nix
License: Freeware | Size: 40.96 KB | Download (39): plone.session Download |
Make your web browsing fast, safe and ad-free with iAntiSpy!
Tired of being followed around by the same retargeted ads on various websites? You need iAntiSpy.
Frustrated by a simple news site taking ages to load? You need iAntiSpy.
Worried about your browsing habits being collected,...
Platforms: Mac
License: Freeware | Size: 6.62 MB | Download (1259): iAntiSpy Download |
Calculate MD5 hash of multiple files. You can copy MD5 hashes to the clipboard or save to a text file from an easy to use interface.
Features:
* Fast Calculation
* Select multiple files, or drag direct from Windows explorer
* Customizable results window
* Save results to a...
Platforms: Windows
License: Freeware | Size: 446.2 KB | Download (278): MD5 Hash Download |
Hash::NoVivify is a Perl extension for non-vivifying exists and defined functions. SYNOPSIS use Hash::NoVivify qw(Defined Exists); ... if (Exists(%hash, qw(key1 key2 ... keyn ))) { ... } if (Defined(%hash, qw(key1 key2 ... keyn))) { ... } When used on a hash, the exists() and...
Platforms: *nix
License: Freeware | Size: 3.07 KB | Download (88): Hash::NoVivify Download |