Showing 31 open source projects for "crc sha tools"

View related business solutions
  • Level Up Your Cyber Defense with External Threat Management Icon
    Level Up Your Cyber Defense with External Threat Management

    See every risk before it hits. From exposed data to dark web chatter. All in one unified view.

    Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
    Try for Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    tio

    tio

    A serial device I/O tool

    tio is a serial device tool that features a straightforward command line and configuration file interface to easily connect to serial TTY devices for basic I/O operations. To make a simpler serial device tool for working with serial TTY devices with less focus on classic terminal/modem features and more focus on the needs of embedded developers and hackers. tio was originally created as an alternative to screen for connecting to serial devices when used in combination with tmux.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Hysp

    Hysp

    An independent package manager that every hacker deserves

    Hysp is an independent package manager designed for flexibility and user-space operation. It focuses on providing statically compiled binaries that can run anywhere without special permissions, making it suitable for environments where traditional package managers are not feasible. Hysp is particularly useful for developers and security professionals who require portable and isolated tools.​
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Ubuntu Mate + Hacking Tools

    Ubuntu Mate + Hacking Tools

    Ubuntu Mate Hacking Distro

    Ubuntu Mate + FSociety Hacking Tools is a distro with hacking tools which can be downloaded in the following link: https://www.mediafire.com/file/6jo2ln3xjqrk5jn/custom-dist.iso/file FSociety integrates tools used for Information Gathering, Password Attacks, Wireless Testing, Exploitation tools, Sniffing & Spoofing, Web Hacking, Private Web Hacking, Post Exploitation. These tools are integrated in just one command. The distro is useful for those who want a Ubuntu Mate with tools like...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    Aviator Predictor

    Aviator Predictor

    Aviator hack: seed-inspection of aviator crash predictor & aviator app

    Our downloadable SHA256 analysis tool powers the Aviator predictor, Aviator predictor app, and aviator crash predictor. Available for desktop, it’s designed for research, fairness verification, and safe demo testing Demo-focused aviator predictor tools — seed-inspection helpers (SHA-512 / SHA-256), AI-assisted summaries, and demo bot templates for aviator crash predictor, Start in demo mode to test safely. Disclaimer: Provided for analytical and testing purposes only. No predictive...
    Leader badge
    Downloads: 152 This Week
    Last Update:
    See Project
  • Get the most trusted enterprise browser Icon
    Get the most trusted enterprise browser

    Advanced built-in security helps IT prevent breaches before they happen

    Defend against security incidents with Chrome Enterprise. Create customizable controls, manage extensions and set proactive alerts to keep your data and employees protected without slowing down productivity.
    Download Chrome
  • 5
    Stake Crash Predictor

    Stake Crash Predictor

    Stake Crash Predictor is a toolkit for stake mines predictor & Plinko.

    The Stake Crash Predictor is a focused toolkit that combines statistical analysis, optional server fairness seed hash decrypt helpers, and AI-assisted summaries to help you study rounds on Stake.us. This project centers on the stake mines predictor and stake predictor workflows Demo-focused stake crash predictor app — seed-inspection helpers (SHA-512 / SHA-256), AI-assisted summaries, and demo bot templates for stake mines predictor too, Start in demo mode to test safely. Disclaimer...
    Downloads: 48 This Week
    Last Update:
    See Project
  • 6
    EasyHash

    EasyHash

    HASH value generator

    EasyHash is a HASH value generator that is very easy to use and at the same time very efficient. Furthermore, the execution speed of the processes is very fast. The user interface is nice, very intuitive and offers multiple methods for importing files. In addition to this, it allows for rapid text entry, making it incredibly easy to use and adaptable to any circumstance of use. EasyHash is an indispensable tool for anyone who works with large amounts of files.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 7
    Roobet Crash Predictor

    Roobet Crash Predictor

    Free Roobet Crash Predictor: the Roobet hack, Tool download.

    Roobet crash predictor is a tool or model that claims to estimate crash points in Roobet’s crash game. Some are simple analysis tools, others call themselves crash tools or crash game predictors - the useful ones focus on reproducible results rather than bold promises. Learn how sha512 vs sha256 impacts Roobet crash predictor claims, practical validation steps, and safe testing to verify any Roobet predictor tool. Curious whether a Roobet crash predictor actually helps your crash strategy...
    Downloads: 14 This Week
    Last Update:
    See Project
  • 8
    Hash Calculator Farm

    Hash Calculator Farm

    Hash Calculator

    Hash Farm is a hash calculator that calculate hash of any files and input text.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 9
    xSum Hash Utility

    xSum Hash Utility

    Command-line utility for Windows which generates and verifies the hash

    .... Users can easily verify that your release is authentic and belongs to you by verifying both the file hashes, and the GPG key. Files that have been tampered with will return a warning to the user. Supported Algorithms: - CRC-8, 16, 32 - MD5 - SHA1 - SHA2-256, 384, 512 - SHA3-128, 224, 256, 384, 512 - Blake2b-128, 160, 256, 384, 512 - Blake2s-128, 160, 256, 384, 512 For a full explanation of using xSum, read https://github.com/Aetherinox/xsum-hash-utility/wiki/Getting-Started
    Downloads: 1 This Week
    Last Update:
    See Project
  • The All-in-One Commerce Platform for Businesses - Shopify Icon
    The All-in-One Commerce Platform for Businesses - Shopify

    Shopify offers plans for anyone that wants to sell products online and build an ecommerce store, small to mid-sized businesses as well as enterprise

    Shopify is a leading all-in-one commerce platform that enables businesses to start, build, and grow their online and physical stores. It offers tools to create customized websites, manage inventory, process payments, and sell across multiple channels including online, in-person, wholesale, and global markets. The platform includes integrated marketing tools, analytics, and customer engagement features to help merchants reach and retain customers. Shopify supports thousands of third-party apps and offers developer-friendly APIs for custom solutions. With world-class checkout technology, Shopify powers over 150 million high-intent shoppers worldwide. Its reliable, scalable infrastructure ensures fast performance and seamless operations at any business size.
    Learn More
  • 10
    DevToysMac

    DevToysMac

    DevToys For mac

    DevToysMac is a macOS-native development toolkit, modeled after Microsoft’s DevToys, offering a suite of utilities for transforming and encoding data. It includes converters (JSON ↔ CSV), hash generators, code formatters, and other essential developer tools—all packaged within a sleek SwiftUI-based interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes...
    Leader badge
    Downloads: 3 This Week
    Last Update:
    See Project
  • 12
    CityHash

    CityHash

    Automatically exported from Google code CityHash

    CityHash is a family of non-cryptographic hash functions optimized for extremely fast and high-quality hashing of strings on modern CPUs. Developed by Google, it is implemented in C++ and designed to efficiently handle both short and long inputs using techniques such as mixing operations and CPU-specific optimizations. CityHash offers multiple hash sizes—32-bit, 64-bit, 128-bit, and 256-bit variants—with the CRC-based versions leveraging hardware acceleration on CPUs that support SSE4.2 CRC32...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 13

    Hex2bin

    Intel Hex or Motorola Hex file converter

    Converts Motorola and Intel hex files to binary. Executables for windows included. A similar project also does hex <-> binary conversions, supports many formats and other features: see: srecord (http://srecord.sourceforge.net/)
    Leader badge
    Downloads: 161 This Week
    Last Update:
    See Project
  • 14
    Helps you to verify the integrity of the files. Hash Calculator for files. Using: CRC32 MD5 RIPEMD-160 SHA-1 SHA-256 SHA-384 SHA-512 Update: Added CRC32 Now supports big files (more then 4Gb) *Requires .NET 4.5
    Downloads: 6 This Week
    Last Update:
    See Project
  • 15

    PeaUtils

    File management utilities: split & join, secure delete, crc/hash

    Suite of file management utilities: split and join files, secure delete, verify checksum and hash values: CRC32. MD5, SHA1, SHA-256, SHA3 and more. Spin-off of PeaZip project.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 16

    Universal File Splitter & Joinner

    the Powerfull, Beautiful file Splitter

    Easy, Lighweight, Free for Sharing and Archieving Universal File Splitter and Joiner is a powerful file splitter and joiner utility that can split a big file into small pieces, then can be joined latter to get the original file, also check Identical for both Source and Joined file. provides many signature algorithm. This application requires- * .NET framework 4.0
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Is My Download Broken?

    Is My Download Broken?

    a powerful multipurpose checksum utility

    It's a cross platform utility designed for performing various checksumming activities. It supports verity of standards including ADLER-32, CRC-32, MD2, MD5, MURMUR-32, MURMUR-128, SHA-1, SHA-256, SHA-384, SHA-512 and SIPHASH24. Also generated results can be validated within the application. Results can be saved to a text file format. It can batch process folders as well. This tool requires Java Run-time Environment 7 or higher to use.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    JavaUtils

    JavaUtils is a collection of tools useful for various quick functions.

    JavaUtils has the following resources: javautils.digest.EzDigest -The following message digests: MD2, MD5, SHA, SHA-1, SHA-256, SHA-384, SHA-512 javautils.network.Ping -A simple ICMP echo request that relies on your system specific utility.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Codegroup

    Codegroup

    A Java application for transferring computer files in 5 letter groups

    ... has a graphical user interface, an Enigma like subsystem must be devised for data whitening. For content encryption, the use of Java's facilities is being considered as a long term option. This project's initial sourcecode is related to : http://www.fourmilab.ch/codegroup/ http://winmorse.com/ https://bitbucket.org/bgneal/cpp-enigma http://www.whence.com/minimodem/ For the User Interface http://www.oracle.com/technetwork/java/javafx/tools/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    nsrlquery

    Provides tools to interface with NIST's NSRL RDS.

    The National Institutes of Science and Technology maintains the National Software Reference Library. As part of this, they keep track of SHA-1 hashes of millions of known pieces of software (the "Reference Data Set"). Unfortunately, there are very few tools to help users query the NSRL RDS. That's where nsrlquery comes in.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    AllCheckSumer

    AllCheckSumer

    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    HashTool

    HashTool

    Easily calculate hash values.

    HashTool calculates the most common hash and hmac values of files and strings by using the "Bouncy Castle Java cryptography API".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    DReport

    DReport

    Console tool for creating directory level reports.

    Tool to create a CSV report on directory hierarchies. Listing includes date range. Great for spreadsheet analysis to govern file archival. Another STDNOJ Project. By R.A Nagy
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24
    CheckSumTool allows user to calculate different (e.g. CRC, MD5, SHA-variants) checksums for files. It also can verify files against given (list of) checksums.
    Leader badge
    Downloads: 19 This Week
    Last Update:
    See Project
  • 25
    Command-line strong encryption tools including: triple cascaded encryptor, multiple hash calculator and multiple block cipher encryptor. Supports AES, Serpent, Twofish, SHA-512, RIPEMD-160, MD5 and other algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.