RSS 11 projects tagged "hash"

Download No website Updated 26 Mar 2014 Canumb

Screenshot
Pop 251.75
Vit 3.95

Canumb aims to crunch data on various forms and turn them into something meaningful. A variety of inputs are currently supported, such as different number base conversions (decimal to hexadecimal, binary to hexadecimal, octal to decimal, etc.) and various encoded formats (a base64 encoder decoder and a URI encoder decoder). It's built to allow for extension when the future demands other input formats be crunched.

Download Website Updated 30 Oct 2013 GtkHash

Screenshot
Pop 126.76
Vit 8.92

GtkHash is a utility for computing message digests or checksums. Currently supported hash functions include MD5, MD6, SHA1, SHA256, SHA512, RIPEMD, TIGER, and WHIRLPOOL.

Download Website Updated 02 Jul 2013 lihata

Screenshot
Pop 52.79
Vit 2.05

lihata is a compact textual language which can represent a tree of lists, hashes, and tables. The syntax tries to be minimal and flexible to allow formatting a lihata file to fit the context it represents. The source release contains an event and DoM parser and helper functions for maintaining lihata trees. lihata is a convenient language for both simple and complex configuration files and text representation of data files.

No download Website Updated 21 Feb 2013 JTreeMap

Screenshot
Pop 18.00
Vit 20.62

JTreeMap is a directory type data structure. It is designed to replace many container classes containing no logic besides getters and setters with one class. This saves a lot of coding and could be especially useful in prototyping.

Download Website Updated 27 Jul 2012 phalanx

Screenshot
Pop 65.02
Vit 3.54

phalanx computes a digest of many buffers simultaneously, and produces a combined hash of them all. It is an initiative to provide a fast, simple, and portable alternative method to compute a checksum in a parallel fashion. It has options for I/O buffer size, hash width, number of threads, and more. It can be run single-threadedly for performance comparisons. It can check files against previously-saved sums, like "MD5sum" does. It also has a "demo" mode, to ascertain accurate operation. It is intended to be useful on large files and multicore/multiprocessor/multithreaded environments.

Download Website Updated 30 Jan 2012 FEHASHMAC

Screenshot
Pop 79.69
Vit 2.01

FEHASHMAC is a collection of publicly known hash algorithms integrated into a command-line utility. Currently 42 hash algorithms belonging to 12 algorithm families are supported, including the five SHA-3 finalist contributions, plus HMAC for each algorithm. FEHASHMAC contains a set of over 540 known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can be directly verified. FEHASHMAC supports bitwise hash calculation for algorithms with available bitwise test vectors. Currently this applies to the SHA algorithms: sha1, sha224, sha256, sha384, sha512, and to the five SHA-3 finalists. The so-called Gillogly bitwise input has only been tested for sha1, but is also implemented in the SHA-2 hashes. Bitwise hash calculation is also supported in sha512-224, sha512-256, and whirl, but there are no bitwise test vectors available. FEHASHMAC can also calculate hashed message authentication codes (HMAC).

No download No website Updated 14 Aug 2010 icp

Screenshot
Pop 28.11
Vit 36.69

'icp' is a script that copies a source directory into a destination while computing MD5 and SHA1 hashes to maintain integrity and eliminate duplicates.

No download Website Updated 27 Nov 2009 y_crypto

Screenshot
Pop 28.46
Vit 40.07

The y_crypto library contains a number of PostgreSQL extension functions, primarily written in C. These include random number generation, generating hash digests, and RSA encryption, decryption, signing, and signature verification.

No download Website Updated 08 Oct 2009 mpf

Screenshot
Pop 21.26
Vit 40.70

mpf is a tool to manage password files of the form: "username:encrypted_password".

Download Website Updated 25 Aug 2009 JRainbow Tool

Screenshot
Pop 34.44
Vit 41.26

JRainbow is a program that generates Rainbow tables for the MD5 and SHA-1 hash algorithms. These tables then can be used for a Rainbow attack to retrieve hashed passwords. Up to 8 digit password rainbow tables are supported. The tables use a textual format. Six variations of alphanumeric and special character sets are supported. You can choose how many times to hash the input before storing it in the table.

Screenshot

Project Spotlight

LiVES

A high quality video editing system and VJ tool.

Screenshot

Project Spotlight

skalibs

Public domain general-purpose libraries.