Showing 50 open source projects for "sha 3"

View related business solutions
  • Run applications fast and securely in a fully managed environment Icon
    Run applications fast and securely in a fully managed environment

    Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.

    Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
  • APIs for the next generation of business text messaging Icon
    APIs for the next generation of business text messaging

    For companies that need a reliable messaging API provider

    Get your customers’ messages where they need to go with 99%+ deliverability. Telgorithm’s API automates A2P compliance & message management for faster, easier, & more reliable messaging, enabling you to offer the best service to your customers.
  • 1
    mendelson AS2

    mendelson AS2

    Implementation of the EDIINT AS2 protocol (RFC 4130)

    mendelson AS2 is a JAVA-based open source EDIINT AS2 solution. Logging- and configuration GUI (SWING), async & sync MDN, signatures, encryption, SSL, web interface, pluggable into any servlet container, TP manager, compression, optional profiles: MA, FN
    Leader badge
    Downloads: 133 This Week
    Last Update:
    See Project
  • 2
    zpaqfranz

    zpaqfranz

    Zpaq compatible archiver for Win, Linux, Free/OpenBSD, Solaris, MacOS

    .... Highest possibilities of data verification, fast, deep and even paranoid-level, with support for multithread acceleration on SSD/NVMe (real world 1GB/s+). Freeware Win GUI (PAKKA) here https://www.francocorbelli.it/pakka/build/latest No complex repository folders, just one file. Latest "hashers" (SHA-3, BLAKE3 w/HW acceleration on Win, XXH3) 15+ years of developing (2009-now). Seeing is believing! https://github.com/fcorbelli/zpaqfranz/wiki
    Downloads: 63 This Week
    Last Update:
    See Project
  • 3

    cppcrypto

    C++ cryptographic library (modern hash functions, ciphers, KDFs)

    cppcrypto provides optimized implementations of cryptographic primitives. Hash functions: BLAKE, BLAKE2, Echo, Esch, Groestl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, SHAKE, Skein, SM3, Streebog, Whirlpool. Block ciphers: Anubis, Aria, Camellia, CAST-256, Kalyna, Kuznyechik, Mars, Serpent, Simon, SM4, Speck, Threefish, Twofish, and Rijndael (AES) with all block/key sizes. Stream ciphers: HC-128, HC-256, Salsa20, XSalsa20, ChaCha, XChaCha. Encryption modes: CBC, CTR. AEAD modes: Encrypt...
    Leader badge
    Downloads: 34 This Week
    Last Update:
    See Project
  • 4
    jDiskMark

    jDiskMark

    Java Disk Benchmark Utility

    ...://sourceforge.net/projects/jdiskmark/files/jDiskMark-0.5.1.msi/download Verify your download with SHA-256 Hash: D8EE4181D42B0CEF4806BF903EE9EF44722DB54C6C7F9EEBAC8BE119BB7AF753 Instructions to verify file SHA-256 signature: https://sourceforge.net/p/jdiskmark/wiki/%20Verifying%20SHA-256%20Hash%20on%20Windows%20with%20PowerShell/ ZIP releases: * v0.5-v0.5.1 requires Java 21 * v0.1-v0.4 requires Java 8 NOTE: run as administrator or w sudo to automatically drop disk cache
    Leader badge
    Downloads: 16 This Week
    Last Update:
    See Project
  • Vivantio IT Service Management Icon
    Vivantio IT Service Management

    Your service operation isn’t one-size-fits all, so your IT service management solution shouldn’t be either

    The Vivantio Platform allows you to focus on the IT service management tools that make sense for your organization’s unique service model: from incident, problem and change requests, to service requests, client knowledge and asset management
  • 5
    The program allows you to generate the hashes with the chosen algorithm (MD2, MD5, SHA-1, SHA-256, SHA-384 and SHA-512) of a single file or an entire folder (you can choose to scan the folder recursively or not recursively). It supports drag and drop of files and folders. The hash can be exported to text files. Compiled with openjdk 8. Usage: param 1: exclude symbolic links (0 or 1) [mandatory], param 2: exclude hidden files (0 or 1) [mandatory], param 3: folders to exclude [optional...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    JVerifier An hash code verifier JVerifier is a command line application that verify checksums from a GNU-style file. Source code available on https://github.com/davidesestiliwork/JVerifier2 Usage: param 1: file name, param 2: algorithm, param 3: baseDir Example: java -jar JVerifier2.jar SHA1SUMS SHA-1 /home/davide Note: this program requires GnuPG to work properly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Hash Farm

    Hash Farm

    Hash Calculator

    Hash Farm is a hash calculator that calculate hash of any files and input string.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 8
    xSum Hash Utility

    xSum Hash Utility

    Command-line utility for Windows which generates and verifies the hash

    An alternative solution to applications such as DirHash, sha256sum, etc. This app is for developers who release programs on services such as Github, Gitlab, or Sourceforce. Easily create and sign a hash digest that will be pushed with the latest version of your application. A hash digest allows your users to verify that your files are authentic and came from the true developer of that application. Create hash digests, sign them with your GPG key, and release the files with your...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9

    HashApp

    python software for cracking and creating SHA and MD5 hashes

    A python software that can be used for encrypting text in SHA384, SHA512, SHA224, SHA1, SHA256 and MD5; or for cracking six different types of hashes, namely SHA384, SHA512, SHA224, SHA1, SHA256 and MD5 through a dictionary attack using an online txt file. You need to have python 3 or above installed to run this progam. If you would like to change the online dictionary URL for hash decryption, use CTRL+F in your text editor and search for this line: LIST_OF_WORDS = str(urlopen('https...
    Downloads: 0 This Week
    Last Update:
    See Project
  • JobNimbus Construction Software Icon
    JobNimbus Construction Software

    For Roofers, Remodelers, Contractors, Home Service Industry

    Track leads, jobs, and tasks from one easy to use software. You can access your information wherever you are, get everyone on the same page, and grow your business.
  • 10
    UUID for Windows

    UUID for Windows

    OSSP uuid provides functions to generate universally unique identifier

    OSSP uuid is a ISO-C:1999 application programming interface (API) and corresponding command line interface (CLI) for the generation of DCE 1.1, ISO/IEC 11578:1996 and RFC 4122 compliant Universally Unique Identifier (UUID). It supports DCE 1.1 variant UUIDs of version 1 (time and node based), version 3 (name based, MD5), version 4 (random number based) and version 5 (name based, SHA-1). Additional API bindings are provided for the languages ISO-C++:1998, Perl:5 and PHP:4/5. Optional backward...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 11
    sha3sum for Windows

    sha3sum for Windows

    SHA-3 cryptographic hash function for Windows 32-bits

    Hash mode interface to the Keccak code package. This program illustrates the use of the Keccak permutation. THE SOLE PURPOSE OF THIS PROGRAM IS THE DEMONSTRATION AND TESTING OF THE KECCAK PERMUTATION. Copyright (c) 2012-2013 McDevitt Heavy Industries, Ltd. (MHI) All Rights Reserved.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12

    Checksum Util

    A unix like CLI checksum utility ported for WindowsNT.

    Available Hashes: 1. MD5 (md5sum) 1. SHA-1 (sha1sum) 2. SHA-256 (sha256sum) 3. SHA-512 (sha512sum) Installation: Download latest Windows zip release from here. Extract the zip file. Then right-click 'install.bat' and Run as Administrator. Usage: In CMD / PowerShell: C:\Users\User Name> sha1sum path/to/file.psd
    Downloads: 4 This Week
    Last Update:
    See Project
  • 13

    file digest

    A command-line utility for calculating and verifying file checksums.

    Digest is a command-line utility which can be used to calculate and verify checksums of any files, similar to md5sum or RHash, but using modern hash algorithms. Supported algorithms: BLAKE, BLAKE2, Grøstl, JH, Kupyna, MD5, SHA-1, SHA-2, SHA-3, Skein, SM3, Streebog, Whirlpool. Usage: digest [-c] <algorithm> <filename(s)> For example, if you want to calculate the checksums using skein512/256 algorithm, use this command: digest skein512/256 * > checksums.skein To verify the checksums: digest...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 14
    JView is a command line client for MyWebProject SOAP Web Service. Usage: param 1: endpoint, param 2: remote folder, param 3: algorithm, param 4: modeParam, param 5: userName, param 6: password, param 7: outputFile Example: java -jar JView2.jar http://davidesestili.ddns.net:8080/MyWebProjectLogin/services/GenerateAndDownloadHashWSLogin /home/dsestili82/ SHA-512 no-subfolders davide davide /home/davide/Scaricati/mozilla.sha512 (Currently unavailable) Source code available on https://github.com...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    SHAFT — Simple Hash Functions Test

    Collision tests for third-party hash functions implementations.

    This project conducts collision tests on many hash functions, trying to find options for those interested in leaving SHA-1 (which is kind of imperative these days). Tests are conducted on a per-environment basis, so that each environment will produce some specific results. Also, user can choose criterion such as: * attempts per second; * collision attempts per max attempts supported; and * power consumption.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    CryptBench

    CryptBench

    A Benchmark which tests CPU cryptography performance

    .... IDEA 5. Chacha20 6. SHA-512 7. SHA3-512(Keccack) 8. MD5 9. Blake2b 10. Whirlpool By default the application uses a buffer size of 256MiB and each test runs for 2 secs(per library test). CryptBench uses Libcpuid for CPU info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    SALMON cipher

    Cryptographic PRNG

    ... schedule relies on SHA-2 (the standard hash function of the NSA.)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18

    CorsoDB Web Application Framework

    A Bootstrap-based web app framework with user management and more.

    Welcome to CorsoDB Web App Framework! CorsoDB is a Bootstrap and PHP based web app framework - a pre-built website template built to serve as either a site or an app - with login/register/user management PHP and SQL pre-implemented by default, with high-end encryption models, specifically SHA-512 Algorithms with signature customised rehashing. There are pages created for login, register, error, member's logged in page, logged out page, and neatly-structured file systems for plugin management...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    SimpleKey

    SimpleKey

    Generates keys up to 500 characters and hashes.

    Ever wanted a random key generator? With SimpleKey, you can generate random keys up to 500 characters in length and save them to text files. These keys can be all numerical, alphanumeric, all alphabetical or the previous three plus special characters. You may use your generated key for whatever purpose. SimpleKey also includes a hash table with which to hash strings and files alike. Hash algorithms include: MD4/5, Sha, Skein, Keccak, Grostl, JH, and Blake.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    TurboPower LockBox

    TurboPower LockBox 2 & 3 Cryptographic Library for Delphi

    LockBox 3 is a Delphi library for cryptography. Currently supported Delphi XE6. It provides support for AES, DES, 3DES, Blowfish, Twofish, SHA, MD5, a variety of chaining modes, RSA digital signature and verific...
    Downloads: 20 This Week
    Last Update:
    See Project
  • 21
    SES Super-Encypherment Scrambler

    SES Super-Encypherment Scrambler

    SES brings back the uncrackable onetime pad, with a digital twist.

    SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    CryptoDock

    CryptoDock

    CryptoDock is a tool that hosts various crypto. algorithms.

    CryptoDock is free multi-platform application written in Java that hosts various hash and modern cryptographic algorithms you can use to protect your sensitive data on your computer. Available cryptographic algorithms: 1. NLSE-1 2. One Time Pad 3. AES Available hashing algorithms: 1. MD5 2. SHA-1 3. SHA-256 4. SHA-512 IMPORTANT: In order to run CryptoDock you need to have Java installed on your computer. Java is free and can be downloaded from - http://www.java.com/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23

    Infinium-8

    CryptoNote based currency. Increasing block reward

    Infinium-8 (INF8) is a new privacy-centric coin using the CryptoNote protocol. Infinium-8 was launched 7/18/2014 12:00 UTC Specifications PoW algorithm: CryptoNight [1] Max supply: Infinite Block reward: increasing with difficulty growth [2] Block time: 90 seconds Difficulty: Retargets at every block [1] CPU + GPU mining (about 1:1 performance for now). Memory-bound by design using AES encryption and several SHA-3 candidates. [2] Infinium-8 s the cryptocoin with block reward inincreasing...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    Simple Network Management Protocol (SNMP) .Net library written in C# (csharp). Implements protocol version 1, 2 and 3
    Downloads: 26 This Week
    Last Update:
    See Project
  • 25
    This tool can create XAdES (XML) signatures based upon ETSI TS 101 903 v1.3.2 standard. It also includes handling of ITU-T X.509 certificates and RFC 3161 timestamps.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next