ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 Next » Displayed: 1 - 25 of 32
Sort by:  relevance | title | downloads | rating | date
Md5deep screenshot
Md5deep 4.4   
md5deep is a set of programs to compute MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digests on ... an entire directory tree. That is, compute the MD5 for every file in a directory and for ...
Freeware

Juniper Password Decryptor
Juniper Password Decryptor 3.0   
... types of passwords, * Juniper $1$ Password: Here MD5 hash of the password is stored. It starts ... These passwords are encoded using Juniper's private encryption algorithm. Password hash starts with $9$ text & can ...
Freeware

BatchRename Pro
BatchRename Pro 4.5.1.1   
... Support Encrypt/Decrypt file name using RC4, Base64 and MD5 algorithm. * Support EXIF data - rename digital camera ...
Trialware | $26.95

Cisco Password Decryptor
Cisco Password Decryptor 6.0   
... 5 Password: These passwords are stored as salted MD5 hash. Requires brute-force attack to recover password Cisco ... These passwords are encoded using Cisco's private encryption algorithm & can be decrypted instantly. This tool helps ...
Freeware

HashTool
HashTool 0.7.3   
... **Key Features:** 1. **Wide Range of Hash Algorithms:** HashTool supports an extensive array of hashing algorithms, including MD5, SHA-1, SHA-256, SHA-384, SHA-512, and more. This versatility ... wide range of needs. Its modern interface, extensive algorithm support, and practical features like drag and drop ...
Open Source

H4shG3n
H4shG3n 0.5.5   
... ability to handle a wide array of hashing algorithms, making it an indispensable tool for anyone involved ... H4shG3n supports a comprehensive range of hashing algorithms, including popular ones like MD5, SHA-1, SHA-256, and ...
Freeware

MD5 Checksum Verifier
MD5 Checksum Verifier 6.2   
MD5 Checksum Verifier is files integrity checker based on the time proven MD5 algorithms. With it you can easily create checksums of ...
Shareware | $14.95

CryptAPI screenshot
CryptAPI 3.0   
... salt. This salt will indicate the type of algorithm that will be used to encrypt such string. ... development. We have integrated almost all the algorithms used in different Linux/Unix distributions and have ported ...
Open Source

Python Encryption Library x64 screenshot
Python Encryption Library x64 9.5.0.98   
... binary data. Python Encryption Library implements symmetric encryption algorithms: Rijndael, Blowfish, Twofish. Also provides public-key encryption and ... and binary data using SHA1, SHA384, SHA512, MD2, MD5, and HAVAL. Provides BZIP2 compression for both strings ...
Trialware | $149.00

Digital Security Suite
Digital Security Suite 2011   
... file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so ... bits Twofish, 256 bits SafeIT-algorithm, 480 bits Hash-algorithm: MD5 HMG Infosec Standard 5, Baseline & Enhanced Peter ...
Commercial | $49.95

Cryptnos
Cryptnos 1.3.3   
... and runs this data through a cryptographic hash algorithm to produce a password that is unique, lengthy, ... repeatable “passphrases” using a variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, ...
Open Source

Hash Codes x64 screenshot
Hash Codes x64 1.62.780.7200   
... This tool supports: Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. Features: Hash data from keyboard, file ...
Open Source

Appnimi MD5 Decrypter
Appnimi MD5 Decrypter 1.0   
Appnimi MD5 Decrypter helps in decrypting any MD5 hash. In appropriate infrastructure it works at a ... 1 million words/second. One of the fastest true MD5 Decrypter available in the market. Above all it ...
Freeware

Toms Hash Explorer
Toms Hash Explorer 1.2   
... verify file integrity. Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ... + Calculate Hash Values using industry standard hashing algorithms + Calculate File Entropy using Shannon's Entropy algorithm ...
Freeware

AUTHENTiC The Checksum Calculator
AUTHENTiC The Checksum Calculator 1.0.1   
... The current version (1.0.1) supports 15 different hashing algorithms. You can validate files with: MD5, SHA1, Adler-32, Blake2b, Blake2s, CRC32, RIPEMD-160, SHA-224, SHA-256, ... If you need to calculate hashes for an algorithm which is not included, please contact me and ...
Freeware

Password Decryptor for Cisco
Password Decryptor for Cisco 6.0   
... 5 Password: These passwords are stored as salted MD5 hash. Requires brute-force attack to recover password Cisco ... These passwords are encoded using Cisco's private encryption algorithm & can be decrypted instantly. This tool helps ...
Freeware

TekOTP
TekOTP 1.4.2   
... homepage regularly for updates. Generates OTPs with MD4, MD5 and SHA-1. Simple, easy to use GUI. Enter seed, pass phrase, set count and algorithm and click 'Calculate' button to generate an OTP. ...
Freeware
tags: OTP, Password

EasyHash screenshot
EasyHash 1.1   
... reducing the learning curve significantly. **Robust Hashing Algorithms** EasyHash supports a wide array of hashing algorithms, including MD5, SHA-1, SHA-256, SHA-384, and SHA-512. This extensive range ensures that users can select the most appropriate algorithm for their specific needs, whether it’s for basic ...
Open Source

File Checksum Calculator
File Checksum Calculator 1.2   
... utility that generates and verifies cryptographic hashes in MD5, SHA-1 and SHA-256. Cryptographic hash functions are commonly ... common cryptographic hash functions are the Secure Hash Algorithm (SHA) and Message Digest Algorithm-5 (MD5). Checksum utilities ...
Freeware

BatchRename
BatchRename 4.5.1.1   
... Support Encrypt/Decrypt file name using RC4, Base64 and MD5 algorithm. * Support EXIF data - rename digital camera ...
Freeware

FastSum Standard Edition
FastSum Standard Edition 1.7.0.512   
... is based on a well-known and time-proven cryptographic MD5 checksum algorithm that makes the calculations and verifications very fast. ...
Trialware | $14.95

Portable HashTools
Portable HashTools 4.8.2   
... The software supports a comprehensive range of hashing algorithms, including MD5, SHA-1, SHA-256, SHA-384, and SHA-512, ensuring compatibility with ... calculation and verification. Its combination of portability, extensive algorithm support, and user-friendly features makes it a standout ...
Freeware

HashTools
HashTools 4.8.2   
... swiftly computes their hashes using a variety of algorithms, including MD5, SHA-1, SHA-256, SHA-384, SHA-512, and CRC32. This range ... hashes. Its combination of a user-friendly interface, comprehensive algorithm support, and seamless integration with Windows makes it ...
Freeware

iSunshare DupFiles Genius
iSunshare DupFiles Genius 3.1.2.3   
... in minutes. It adopts an advanced & smart MD5 Message-Digest Algorithm to identify the same files. Considering the security ...
Shareware | $19.95

How to Open EML File into PDF
How to Open EML File into PDF 4.0   
... by subject, DD-MM-YY, DD-MM-YYYY, MM-DD-YYYY, Auto incremental and MD5, etc. ...
Shareware | $69.00
Results Page: 1 2 Next » Displayed: 1 - 25 of 32
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags