Showing 32 open source projects for "hash compare"

View related business solutions
  • Powerful App Monitoring Without Surprise Bills Icon
    Powerful App Monitoring Without Surprise Bills

    AppSignal starts at $23/month with all features included. No overages, no hidden fees. 30-day free trial.

    Tired of monitoring tools that punish you for scaling? AppSignal offers transparent, predictable pricing with every feature unlocked on every plan. Track errors, monitor performance, detect anomalies, and manage logs across Ruby, Python, Node.js, and more. Trusted by developers since 2012 with free dev-to-dev support. No credit card required to start your 30-day trial.
    Try AppSignal Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1

    Hash-Machine

    Hash and compare multiple files and multiple SHA-256 strings

    Hash Machine is a small Go project that provides quick hashing and comparison of local files and SHA-256 strings. It is a command line utility that accepts between 2 and 10 arguments, and then reports on matching groups and unmatched arguments.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Simple-Image-Duplicate-Cleaner

    Simple-Image-Duplicate-Cleaner

    Windows GUI application tool for image similarity checking

    This is a Windows GUI application tool for image similarity checking. No installation is required, just run it. It searches for HEIC, PNG, BMP, JPEG image formats in the specified directory and uses hash to compare similarities. It is still a bate version.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Hash Latch
    ...Instead, it encrypts the key and outputs the ciphertext. That means that instead of giving you the actual key, it gives you a safe containing the key. This approach allows the hash latch to protect itself from forged keys and also enables you to put the same key into multiple safes without the recipients of these safes knowing they have the same key (even if they compare their ciphertexts). Moreover, the hash latch verifies the integrity of a key after decrypting it (just in case). You can read the tutorial about it on Instructables: https://www.instructables.com/Hash-Latch/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Compare Backup Drive Hashes

    A spreadsheet to aid in detecting ransomware-corrupted files

    This project offers an Excel spreadsheet, available for download through the Files tab (above). The spreadsheet allows the user to compare two sets of file hashes, such as the hashes for files on two different data drives. The spreadsheet's Instructions tab provides step-by-step guidance through that comparison process. The purpose of the file hash comparison is to identify files whose contents have changed. For example, the files on an up-to-date data drive may be compared against the files previously found on that data drive, or on a backup drive. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    With this tool you are able to test different hashes: - MD2 - MD5 - SHA1 - SHA224 - SHA256 - SHA384 - SHA512 Recommended Java 8 For any questions you may use the ticketing system .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    JChecksum

    JChecksum

    MD5 Checksum Tool

    This tool checks the integrity of files. It is very important if you don’t want your computer to get infected with viruses and malware. Sometimes, hackers and malicious software developers modify the contents of a downloadable zip, which can even result in granting them remote access to your system. While downloading various software, you might have noticed that developers usually provide hash values (MD5) of their files. This tool enables you to verify the file integrity of the downloaded...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    CoSA (Concurrent Subtractive assembly) is a package to detect differential short sequencing reads by comparing two groups of metagenomes on the basis of kmer frequencies. KMC 2 is one of the fastest k-mer counting implementations, so we employ KMC 2 for k-mer counting in our package. Because in many cases we need to compare tens of or even hundreds of samples, we adopt the concurrent hash table in Libcuckoo for efficient k-mer counting. Once the differential reads are extracted, they can be used for downstream analysis including assembly to identify genes that are differentially abundant between groups of metagenomes (e.g., healthy vs diseased). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    dotNet File Hash

    An implementation of various hashing algorithms in C# 4.0

    This is a C# .Net 4.0 file hashing Windows application that implements a variety of hashing algorithms (MD5, SHA1, SHA256, SHA384, SHA512, RIPEMD160) readily available in the System.Security.Cryptography section of the .Net framework and can be used to compare files from various folders for true file duplications by directly hashing the content and ignoring other extended details. The application UI is pretty crude, but the underlying code is quite lean. As always, this application is an...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    iFile Compare

    A simple file comparison tool

    A file comparison tool used to compare the name, size and md5 hash of files. Good for massive file movements to the cloud and verifying file integrity.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    Small application which can help you to verify hashes and if your files from internet weren't broken. Supported hashes: CRC32, sha1 - sha512. Platform: .NET, Mono. Windows Shell integration. Can compare to hash in clipboard. Color highlighting.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 11

    Bellator-Integrity

    Check the file integrity

    Check the file integrity using SHA hash algorithms. It has two modes: - MakeHash: Create a signature hash of the files - CompareHash: Compare the signature hash of the files with the current signature hash to detect changes in them.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    WinMd5Checksum

    WinMd5Checksum

    Calculating and comparing MD5 checksums, calculating SHA256 hash

    You can calculating md5 hashsums, comparing files and hashsums in pairs. If you have backups of one file and you have a md5 hashsum, you can compare your backups against this md5 hashsum. Calculating SHA256 hashes too. This repository will no longer updated! Please take a look at this url: https://github.com/tualatin/winmd5checksum
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    qlsdup

    GUI based lightweight duplicate file finder / remover.

    ...Algorithm is simple and suitable for large file sets with few differences: basic set of duplicate candidates is determined by file size, then candidates are compared byte-wise. So for files which don't start to differ by growing at the tail it reduces read operations greatly compared to hash-based comparision (i.e. test case: 40GB of files, 16GB RAM, many differences: initial compare (uncached by OS) around 300sec, subsequent compare (relevant file parts cached by OS) ca. 2sec) Note: this program is not related to lsdup
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    chksm-chkfile

    chksm-chkfile

    Windows MD5/SHA-1/SHA-256 file hashes calculator.

    Calculate MD5, SHA-1, SHA-256 checksum hashes from a specific file, and compare these values with a given string. Accept one filename as parameter. Functionalities : - automatically retrieve text from Windows clipboard and compare it. - 32 & 64 bits windows platforms supported - Installation (Add to file context menu) - Uninstallation Requirements: - Microsfot .NET Framework 2.0 Files: chksm-chkfile.exe MD5: c0b7761deeb7d7dc45aa04726309d4ca SHA1:...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Quick Check

    Quick Check

    Quick Check is a small MD5 comparison program.

    ...At this point in the project it just compares MD5 however in the future it might support SHA1 and others. When you first open the program you are greeted with a small form that contains two text boxes and one button. First you enter the hash of the file you got from where you downloaded, next click the button and browse to the downloaded file and the program will retrieve the MD5 hash and compare. If they match, the label at the bottom left will let you know, same on the contrary. Please read the README after you download this as it contains some decent info as well. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    AllCheckSumer

    AllCheckSumer

    Calculate and compare files with 3 different file signature algorithms

    AllCheckSumer is a handy tool for computer forensics and is helpful for investigators to search throughout a computer’s file system for a bad hash specified by the investigator. The tool will search throughout a location, specified by the investigator. It can be either an entire file system or a specific folder, and create a hash set with the following file signature algorithms: • MD5 (Message-Digest Algorithm v. 5) • SHA-1 (Secure Hash Algorithm v. 1) • CRC (Cyclic Redundancy Check)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Hash Monster
    A versatile gui and console application capable of generating and comparing hashes using a variety of popular hashing libraries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    enviroHash

    enviroHash

    A network utility to MD5 hash and catalog a running file system.

    enviroHash is a network utility designed to be executed standalone or through remote management software. It uses fsum by Slavasoft to hash all accessible files within a scope that is defined through command line arguments. Uppon completion enviroHash will generate a .txt output file that contains a "hash","filename" pair delimited by commas. This file can then be imported into the enviroHashBrowser so that System Administrators can search a host or all hosts for particular filename or hash value, and compare one host to another to view similarities/differences. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Advance MD5 Checksum

    Advance MD5 Checksum

    This software allows users to generate the MD5 and SHA Hash Checksum.

    ...Other features are: compare a file with an MD5 hash and compare two files to know if files are different or equal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Hash Codes
    Program can hash data from keyboard, file or CD/DVD by Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, TIGER or Whirlpool algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    CSBackup

    Commandline Backup with hardlinks, excellent memory saving strategy

    ...One of the main features is the support of long file names (more than 255 characters) and UTF-8 support. * Use of Aliases for folders * Backup complete drives from the root * Compare file changes by size and date (faster than hash-codes) * Different log levels * Delete Strategy: strategic configuration to configure which backup folders to keep (e.G. 7 daily, 4 weekly, 12 monthly, 10 yearly)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    DirComparator is used to compare contents of two folders.It checks for file existence, size, modification date and hash (SHA1).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    A file hash generator. Generates MD5, SHA-1, SHA-256 and SHA-512 hashes for the selected file. Can choose any combination of the 4 hashes. Simple, Small and fast. Works great on ISO's and any other files. I might add in ability to compare hashes to
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    A console application to find duplicated files in your hard disk that allows you to choose which duplicated files delete. It will work with a DB to store information of your files and compare them using a hash code like md5. Wait! I am still working
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    ...The sorting is done by the capture date/time of the EXIF-Header. Image meta informations from EXIF-Header is stored in a database. Double files will be recognized by MD5-hash compare.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next
MongoDB Logo MongoDB