Hash Free Download


HIME dll

Library with encryption functions (public key/secret key) and huge integer math functions. RSA public key, AES (Rijndael) secret key encryption. SHA-256 hash function. Random number generation (Blum-Blum-Shub, RSA,..). For every programming language. This development tools shareware HIME dll is categorized under components, programming, libraries, encryption, mathematics.

powerbasic encryption schemes digital signatures

RemoteIntegrity Website Scanner

Protect your website from unauthorized changes (hacking). Protects against defacement and malware via date/MD5 hash of all files on your site. Application is free, without restriction and contains no advertising or other annoyances. This freeware is archived under web development site administration category.

malware annoyances restriction

CommuniCrypt File Encryption Tools

File encryption/decryption tools with strongest AES algorithm. Can generate the hash of the source file as password for symmetric encryption(64 digits password). Encryption strength AES Rijndael: 256 bit / Hash: SHA-256. CommuniCrypt File Encryption Tools is a freeware software filed under security, privacy encryption tools utilities.

algorithms symmetric encryption encryption strength


Simple utility to create checksum files based on the MD5 hash routine. Recursively scans a selected folder and creates the checkfile data which can then be loaded in for testing to determine if the files have changed at all.

recursively checksum recursively scans

SafeCopy 2.0

Litigation support, computer forensics and corporate IT rely on SafeCopy everyday. If you need to securely copy files from clients systems (preserving timestamps) and servers with a verification log and electronic Chain of Custody, you need SafeCopy 2.0. This new improved version of SafeCopy includes options to select multiple data sources, hash files before and after the copy, real-time file verification, easily resume aborted or cancelled jobs. Utilities demo SafeCopy 2.0 is listed in system utilities file, disk management tools.

data sources chain of custody timestamps


This tool is a powerful yet very easy to use application designed for computes hash value(checksum) for any single file, it allows you to verify that downloaded files are not corrupted or otherwise unusable before you burn them to disc or host them on your file server. Utilities freeware HashX is listed in security, privacy other tools.

hash value checksum downloaded files

SHA1 Signature Tool

Create, save and compare SHA1 hash of any file. Easy to use GUI interface displays a green indicator when any two files are identical. Use to verify downloaded file integrity and critical files. SHA1 Signature Tool is a freeware software filed under security, privacy encryption tools utilities.

critical files interface downloads

SIM Card Seizure

Recover SMS & text messages and analyze all data on SIM cards with the tool used by forensic experts around the world. Analyze data on the card, recover deleted items such as SMS/Text messages, verify data integrity with hash values, & search data. Utilities demo SIM Card Seizure is listed in security, privacy covert surveillance tools.

sim card readers ediscovery analysis tool

MD5 Tool

Generating MD5 hash is now fun and easy with MD5 Tool. Just drag and drop! Includes copying hash to clipboard or compare the hash with one stored in clipboard. MD5 Tool is a demo software filed under system utilities other utilities.

sums clipboard drag and drop


Autostart of any files and portable software, once a USB flash drive or hard disk to the computer will connected. The autostart extension will be in the system control configured and working after the setup completely in the background. For security reasons, the software works with the permissions of the logged-on user. A hash function for programs is integrated to detect manipulations by computer viruses. This utilities freeware AutoRunnerX is categorized under system utilities launchers, task managers.

security reasons manipulations hash function

febooti fileTweak Hash & CRC

Hash calculation software febooti fileTweak Hash & CRC is a freeware hash / CRC calculator. Compute hash fingerprint / CRC checksum from any provided file. Supported hash / CRC formats: CRC32, MD2, MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, WHIRLPOOL-1 and Tiger-192.

MSCCrypto for Linux

MSCCrypto is an Active Server component. It is a collection of the best encryption and hashing algorithms: RSA public key algorithm (512/1024/2048 bits key size) AES symmetric block algorithm (128/192/256 bits key size) Blowfish symmetric block algorithm (64 to 448 bits key size) Twofish symmetric block algorithm (128/192/256 bits key size) MD5 hash (128 bits hash) SHA1 hash (160 bits hash) 32-bit CRC checksum algorithm

HIME: Huge Integer Math and Encryption

Library with encryption functions (public key/secret key) and huge integer math functions. RSA public key, AES (Rijndael) secret key encryption, SHA-256 hash function, PRNG: Blum-Blum-Shub and RSA, Diffie-Hellman. For every programming language. HIME: Huge Integer Math and Encryption is licensed as shareware and placed in components, programming, libraries, encryption, mathematics section.


ZIP+AES+DS2; encodes filenames, files and folders in a single encrypted ZIP archive; SecretKeys expansion and pre-encoding; Wipe-File Module; Paranoia Keyboard©; very easy to use; MS-Windows Explorer integration and MUCH MORE! CypherZIP is a shareware software filed under compression, encryption utilities.


Integrate licensing into your applications and maintain a database of your licensees. Protect your software against piracy by using hash, checksums, antidebugging and antimonitoring. As against many other products It gives the full control over debuggers and monitors. It includes functions of enciphering and the digital signature for using in your C/C ++, Delphi and VB programs.Simple in use and also has the detailed help with video tutorial.


Do you want use your email to backup files, photos, even movies? Do you want your emailbox has directory structure? When you use CoolMailDisk, you can do all the works easily. You only do these with your CoolMailDisk just like a logic disk. CoolMailDisk is licensed as shareware and placed in communications e-mail clients section.


Professional program for recovering logon passwords in Windows NT/2000/XP/2003/Vista. This program, which does not require installation, has one of the highest password forcing speeds currently on the market. It supports over 10 types of data import and several types of attack, and includes additional tools to extract and process encoded passwords.

Encoder Wizard ActiveX

Encoder Wizard is a collection of two ActiveX (ocx) controls, Encoder Wizard and Decoder Wizard. These two controls allow you to fully support the Base64, Quoted- Printable, UUEncode, yEnc, MD5,HMAC MD5, URL, SHA-1, and Binary 2 Hex encoding methods. This shareware is archived under development compilers, interpreters category.


The program IPTunnelManager is used for IP tunneling with the options for compressing and encrypting traffic. This internet shareware IPTunnelManager is categorized under system utilities security, programming winsock, programming databases, database utilities, connectivity proxy servers, connectivity winsock tools, telnet clients, telnet servers.

Digital Security Suite

This tool helps you protect the files on your computer. You can for example encrypt individual files for storage or secure mail attachements. You can also permanently remove (shred) files, folders and other information. Digital Security Suite is licensed as commercial and placed in security, privacy other section.

MD5 Password

This tool is a tool for security professionals, which allows recovering a password if you know its MD5 hash. The fast recovery engine can recover up to 32,000 passwords simultaneously. Distributed recovery is supported. Utilities demo MD5 Password is listed in security, privacy other tools.


This software is a free, open source, "on-the-fly" (OTFE) transparent disk encryption program. Using this software, you can create one or more "virtual disks" on your PC - anything written to which will be automatically, and securely, encrypted before being stored. Many features included, with both PC and PDA versions available. Utilities freeware FreeOTFE is listed in security, privacy encryption tools tools.

SafeIT File Encryption

Software that is a user-friendly program that allows you to prevent unauthorized access to restricted documents. Encrypt sensitive documents and other private digital information you have on your computer. The encrypted files are are only accessible by entering the correct password. Ideal for encrypting e-mail attachments as it doesn't require any additional software from the recipient. Multiple secure formats to choose from.

MEO File Encryption Software

Encrypt or decrypt files of any type using this powerful data encryption tool. MEO allows you to protect your sensitive data against un-authorized viewers by utilizing the latest data encryption technologies. MEO File Encryption Software is a freeware software filed under security, privacy encryption tools utilities.


Program is designed for the password recovery by the hash-value (44 hash-functions included - MD4, MD5, DES, NTLM, GOST, SHA and others) using 5 high-speed attack methods. Distributed bruteforce and multicore attack are supported. The program is considerably optimized for the "mass cracking" (very big amount of hashes at once without decreasing of the search speed). This shareware is archived under security, privacy encryption tools category.


This utility makes it quick and easy to compare and synchronize the contents of any two files or folders. Whether you're trying to keep files and folders organized on a desktop computer, performing backups to removable disks, synchronizing rapidly changing laptop data with your main computer, or doing network file maintenance, FolderMatch offers one-button synchronization for the novice, and a range of sophisticated tools for the advanced user. FolderMatch is a shareware software filed under file synchronization software, duplicate file finder, file management, backup utilities, system utilities, directory comparison software, utilities, backup software, data base management software utilities.


Digital file signing software. SignStation is an innovative software application that lets you apply a digital signature, verify the digital signature on a signed file, encrypt and decrypt files and manage certificates, among other functionalities like email, hash, and file management. A smtp mailer is included to send you files and public certificates in an easy way with the benefit of having its own mail engine that avoid you some viruses common attacks. Easily sign your files with this tool, a useful application for software developers. SignStation is licensed as demo and placed in security, encryption, digital signature, mail, file managers section.

MD5 Checksum Verifier

This utility is files integrity checker based on the time proven MD5 algorithms. With it you can easily create checksums of files and verify their integrity in the future. The operation is very easy, just two steps, make check file and verify check file. This utilities shareware MD5 Checksum Verifier is categorized under system utilities file, disk management.


RunScanner is a completely free windows system utility which scans your system for all configured running programs. You can use runscanner to detect autostart programs, spyware, adware, homepage hijackers, unverified drivers and other problems. This freeware is archived under system utilities system maintenance category.

FactotumNOW Web Checking and Replication

Allocate a staging area on your network and replicate the Web files from there onto your Web servers. Operate with several Web servers by replicating one content source to several servers. Support for remote FTP sites. FactotumNOW Web Checking and Replication is licensed as commercial and placed in web development site administration section.

Arovax TraySafe

TraySafe password manager allows you to forget passwords! It will save and protect them for you: encryption and hashing algorithms, autoinsert and autofill, hardware ID, USB drive support. You can forget passwords and you will not lose them! Arovax TraySafe is licensed as shareware and placed in security, privacy password managers section.


Software protection tool against reverse engineering on different platforms for PDA developers. This demo is archived under development management, distribution category.

Directory Lister Pro

Create and print listings of files from selected directories on hard disks, cd-roms, dvd-roms, floppys, usb storages and network shares. The listing can be in HTML, text or CSV format. You can print standard information like file name, extension, type, owner and attributes as well as EXE, DLL, OCX information like file version, description, company, MP3, DOC, XLS, PPT, AVI, WAV properties like track, title, album, FPS and CRC32, MD5, SHA1 hashes. Directory Lister Pro is licensed as shareware and placed in system utilities file, disk management section.


The professional program to recover the passwords for user hashes. The range of hashes supported include: MySQL, MD5, SHA-1 and others. The program also supports many complex hashes like md5($pass.$salt), md5(md5($pass)) and others. Because the program has a convenient open API, it is possible to quickly modify and supply the program with any required hashing module written in any programming language. This utilities demo PasswordsPro is categorized under security, privacy password managers.

VISCOM 3GP, FLV MP4 Video Edit Converter Gold

3GP, FLV, SWF, iPod, PSP, MP4, RMVB, VCD, SVCD, DVD, MOV, AVI, DIVX, WMV, MP3, WMA, WAV formats video converter. This is one application and it including a lot of video editing function. Graphics shareware VISCOM 3GP, FLV MP4 Video Edit Converter Gold is listed in audio, multimedia video tools tools.

Advanced NT Security Explorer

A program for Microsoft Windows NT, Windows 2000 and Windows XP system administrators for finding holes in system security. It analyses user password hashes (being retrieved from Registry, memory or remote computer), and tries to recover plain-text passwords. If it's possible to recover the password in a reasonable time, the password should be considered to be insecure.


Copyright © 2003-2011 Filesland Software