Sha
Sha4j is a one class implementation of SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 algorithms.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 105.16 KB | Download (47): Sha4J Download |
Shasummer is a SHA hashsum utility in Java. It can calculate SHA1, SHA256 and SHA512 hashes of a file or of a directory (and its subdirectories) and verify the hashes later. Shasummer has a graphical and a command-line interface.
Platforms: Windows, Mac, Linux
License: Freeware | Size: 320.1 KB | Download (58): shasummer Download |
A set of very small categories for NSString, NSMutableString, NSArray, and NSDictionary that add a few sorely lacking features (isEmpty and containsKey: methods, for instance). These functions can be found in MPFunctions.h. . NSString *MPHexStringFromBytes(void *bytes, NSUInteger len) ....
Platforms: Mac
License: Freeware | Size: 10.24 KB | Download (44): MPTidbits Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 18.29 MB | Download (39): KeyMingler Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 12.35 MB | Download (34): gurbas Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.32 MB | Download (38): nulis Download |
In cryptography, SHA-1 is a cryptographic hash function designed by the United States National Security Agency and published by the United States NIST as a U.S. Federal Information Processing Standard. SHA stands for "secure hash algorithm". The three SHA algorithms are structured differently and...
Platforms: Mac
License: Freeware | Size: 5.16 MB | Download (38): Vakar Download |
A file hasher written in java 1.6 capable of generating MD5, CRC32, SHA-1, SHA-256, SHA-384 and SHA-512 checksums of any file as well as comparing generated checksums. Requires Java Runtime Environment 1.6
Platforms: Mac
License: Freeware | Size: 1.69 MB | Download (43): HS File Hasher Download |
CheckIt is an extension that allows to select a checksum posted on a web site and compare it with the downloaded file or compare two files. It supports MD5, SHA-1, SHA-256, SHA-384 and SHA-512, which are detected automatically.
Platforms: *nix
License: Freeware | Size: 30.72 KB | Download (41): CheckIt Download |
The pycryptopp package contains Python wrappers for the Crypto++ library. RSA-PSS-SHA256 signatures, ECDSA(1363)/EMSA1(SHA-256) signatures, SHA-256 hashes, and AES-CTR encryption
Platforms: *nix
License: Freeware | Size: 1.06 MB | Download (39): pycryptopp Download |
dc3dd is a patched version of GNU dd to include a number of features useful for computer forensics. Many of these features were inspired by dcfldd, but were rewritten for dc3dd. Pattern writes. The program can write a single hexadecimal value or a text string to the output device for wiping...
Platforms: *nix
License: Freeware | Size: 2.83 MB | Download (37): dc3dd Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 478.93 KB | Download (62): Checksum-Aide Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 478 KB | Download (62): Checksum Aide Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 505 KB | Download (63): Checksum Aide 64 bit Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 408 KB | Download (61): Checksum Aide 64 Bit Portable Download |
Checksum-Aide is a utility used to generate hash codes (or checksum codes). You can use this tool to verify that a program you downloaded from the internet has not been corrupted or tampered with.
If you are a developer, you can use this tool to generate your own hash codes so that your user...
Platforms: Windows, Windows 8, Windows 7, Windows Server
License: Freeware | Size: 390 KB | Download (37): Checksum Aide 32 Bit Portable Download |
NeoNapster is a free file sharing program based on the Gnutella protocol. Similar to Napster and Morpheus, NeoNapster gives users the ability to search for, download, and share music, videos, software and more with millions of others.
NeoNapster supports the most powerful Gnutella features,...
Platforms: Windows
License: Freeware | Size: 2.31 MB | Download (726): Neo Napster Download |
Incognito Chat is a free instant messaging tool for use with MSN Messenger and Windows Messenger, it allows for encrypted instant messaging sessions using proven cryptographic algorithms.
Features include:
* Encrypted instant messaging: 256 bit Rijndael, 4096 bit RSA and SHA-512
*...
Platforms: Windows
License: Freeware | Size: 1.22 MB | Download (277): Incognito Chat (i-chat) Download |
Advanced hexadecimal editor. Few important programs features: 6 color schemes to interpret bytes visually. Every of them tryies to fit some functionality (for example text analyzing) and user preferences Unlimited undo Access to logical disks under Windows NT/2000/XP Disassembler Import and...
Platforms: Windows
License: Freeware | Size: 485 KB | Download (755): Hexplorer Download |
VisualHash is a hashsum calculator with a graphical user interface. Supported algorithms: Adler-32, Cksum-32, CRC-16, CRC-16-CCITT, CRC-16-XModem, CRC-32, CRC-32-MPEG2, CRC-64, ELF-32, FCS-16, FNV-32, FNV-64, GOST, MD2, MD4, MD5, PJW-32, SDBM-32, SHA-1, SHA-256, SHA-384, SHA-512, Sum-32 and...
Platforms: Windows
License: Freeware | Size: 74 KB | Download (1104): VisualHash Download |