Hash Software

 

HashTab

A windows shell extension which installs a new tab with file hash information. Includes MD5, SHA1 and CRC032. Also allows for easy hash comparison. Great for verifying downloads without requiring any external tools.

DPASHA

DPASHA created a single HASH. SHA1 160bits, MD5/MD4 120bits, RIPEMD-128 128 bits RipeMD-160 160 bits, CRC32, SHA-256 256 bits SHA-384 384 bits SHA-512 512 bits and HAVAL 256 Freewareversion. Current Version 1.5 You can test files for manipulations. Easy to use, support Drag&Drop. All hashes are standard with all other hash program and hashes. Multilanguage

CypherZIP

Features: The reliability of the ZIP compression algorithm plus Rijndael and DS2 algorithms to provide the data encryption; includes Paranoia Keyboardİ; Hash tables based on SHA256; SecretKeys expansion and pre-encoding; ultimate Wipe-File; Password to access the program; MS-Windows Explorer integration and MORE!

Iside

Iside compares files and folders by computing their hash code (MD5,SHA1,SHA256). Right click on a file, select Copy and by right clicking on another file you will discover if the two files are equal. Includes file comparison, hash generating tool plus a complete folder comparison tool. The hash functions allow to determine if two files are different even if their size is the same. Ideal tool for configuration managers, programmers, deployers.

SIM Card Seizure

Paraben''s SIM Card Seizure is a forensic analysis tool used to acquire and examine data from a SIM Card. Used by forensic experts around the world, SIM Card Seizure can not only analyze data on the card, it can recover deleted items such as SMS/Text messages, verify data integrity with hash values, and generate a full report of the data on the card which preserves the evidence you gather. It also has unicode support to read multiple languages.

Hash

Forensic examiners often need to quickly obtain the hash values for potential evidence files for reports or to verify their results. Pinpoint Hash was created to allow users to quickly obtain the hash values for CRC-32, MD5, SHA-1 and SHA-256 hash values for any file and quickly copy the results to the clipboard for easy transport to any other application. It''s quick. It''s simple. It''s free. Enjoy.

HashCalc

Free, fast calculator to compute hash, checksum, HMAC values for file, text and hex string. Supports popular message digest and check sum algorithms: MD2,MD4,MD5, SHA1,SHA2, RIPEMD160,PANAMA,TIGER, CRC32,ADLER32, and the hash used in eMule/eDonkey (eDonkey2000,ed2k). With this tool you can test for corruption FTP download/upload transfers, compare music,audio,video,game,image files, verify a CD, perform checking of mp3,mpeg,vcd,iso,zip downloads.

PasswordZilla

PasswordZilla is a powerful password and hash generator. It''s interface is simple, and easy to comprehend. PasswordZilla allows you to easily generate and store passwords and hash. It will be helpful for webmasters, system administrators, software developers.

HIME: Huge Integer Math and Encryption

HIME is a library with encryption functions and huge integer math functions. RSA public key, AES (Rijndael), RC4 secret key encryption, MD5, SHA-256 hash function, random number generation (Blum-Blum-Shub, RSA), Diffie-Hellman... Every programming language that can access a dll can use HIME: C, C++, Visual Basic, Delphi, PowerBASIC, PureBASIC.. The math functions work with huge integers that can be up to 2^31 bits long (268 million digits).

Porta''Menu

Portable menu launcher for fixed or portable devices. Keeps a list of programs to be launched easily from the menu, ordering it anyway you like. Can create program groups for easier use. Has an hash control for program safety, effectively making programs safer against virus, spyware and the like.

FileCheckMD5

Simple utility to create checksum files based on the MD5 hash routine. Recursively scans a selected folder and creates the checkfile data which can then be loaded in for testing to determine if the files have changed at all. Great for putting in the root folder of a CD-ROM to make sure the disc isn't defective when it is burned or mass produced.

RemoteIntegrity Website Scanner

Protect your website from unauthorized changes (hacking). Protects against defacement (visible changes) and malware (invisible changes) via date change and/or MD5 hash of all files on your site. Application is free, without restriction and contains no adverting or other annoyances. Source code available for nominal charge.

CommuniCrypt File Encryption Tools

File encryption/decryption tools with strongest AES algorithm. Can generate the hash of the source file as password for symmetric encryption(64 digits password). Encryption strength AES Rijndael: 256 bit / Hash: SHA-256

Image comparison algorithm

We are proud to present you our unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out. Can work with many programming languages including Delphi, Visual C++, C#, VB and VB.NET. We can also provide you with the modified DLL. It can precalculate image hash (768 bytes) and you can use these hashes for comparison then.

Paraben''s Registry Analyzer

Windows registry files can have thousands upon thousands of entries. Viewing, analyzing, and reporting on these files can be a daunting task. Registry Analyzer is a comprehensive computer forensic analysis tool for analyzing Windows registry entries. FEATURES: Compatible with Paraben''s P2 Examination Technology. Hash value verification: MD5, MD4, & SHA1. Load multiple registries. Bookmarking. Advanced searching options. Reporting & more.

SubDownloader

Subdownloader is a GPLv3 Opensource tool for automatic download and upload subtitles for videofiles (DIVX,MPEG,AVI,etc) from www.OpenSubtitles.org (OSDB) and some others (ISDB). It uses special hash function for finding correct subtitles. Main Features: no spyware, no adware, source code is available at project homepage, it uses fast hashing algorithm (27 GB movies/7 seconds), search and download subtitles for many movies, upload subtitles

SafeCopy 2.0

Litigation support, computer forensics and corporate IT rely on SafeCopy everyday. If you need to securely copy files from clients systems (preserving timestamps) and servers with a verification log and electronic Chain of Custody, you need SafeCopy 2.0. This new improved version of SafeCopy includes options to select multiple data sources, hash files before and after the copy, real-time file verification, easily resume aborted or cancelled jobs.

febooti fileTweak Hash & CRC

febooti fileTweak Hash & CRC is a freeware hash / CRC calculator. Compute hash fingerprint / CRC checksum from any provided file. Supported hash / CRC formats: CRC32, MD2, MD4, MD5, SHA-1, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320, WHIRLPOOL-1 and Tiger-192.

MD5 hasher

Computes MD5 hash for any file, can compare it with given. Integrates in Send To and shell on demand. Un-integrates on demand. Drag-and-drop supported. Automatically looks for corresponding md5 file with hash to compare, and vise-versa. Large files supported. Progress indicator and cancellation. UNC (local network filenames) supported. Now with updates check support.

Lucigenic Crypt

Lucigenic Crypt is a COM component that provides advanced cryptographic services for web servers, applications and scripts. Crypt implements the Blowfish, AES (Rijndael), Secure Hash Algorithm and the Base64 encoding algorithm. ECB, CBC, CFB and OFB modes are implemented. Encrypt files, file regions and strings. Compress and encrypt files and strings in a single step and create self-decrypting archives for files and strings.

MetaViewer

Forensic examiners and litigation support professionals often need to retrieve the metadata for specific files. Pinpoint Metaviewer allows users to quickly extract file system metadata, OLE metadata contained in Microsoft Office Files and hash values all at the click of a mouse. Once the information is retrieved users can paste all or selected fields into any application.

MSCCrypto for Linux

MSCCrypto is an Active Server component. It is a collection of the best encryption and hashing algorithms: RSA public key algorithm (512/1024/2048 bits key size) AES symmetric block algorithm (128/192/256 bits key size) Blowfish symmetric block algorithm (64 to 448 bits key size) Twofish symmetric block algorithm (128/192/256 bits key size) MD5 hash (128 bits hash) SHA1 hash (160 bits hash) 32-bit CRC checksum algorithm

HsCipherSDK Encryption Library

HsCipherSDK is an Encryption Library providing an API to a suite of symmetric cryptographic algorithms and digital signing functions. The library includes block and stream cipher modules: AES, 3DES, ARC4, CAST-128, Blowfish,Twofish, MD5, SHA-1. HsCipherSDK includes Standard DLL and ActiveX DLL for use from Visual C++, Visual Basic or other languages, code examples, documentation. HsCipherSDK Plus edition includes full source code in Viusal C++

P2 eXplorer

Paraben''s P2 eXplorer allows you to mount a forensic image (or Linux DD, RAW, or other drive images) and explore it as though it were a drive on your machine while preserving the forensic nature of your evidence. This means that an image isn''t just mounted to view logical files, it is mounted as the actual bitstream image, preserving unallocated, slack, and deleted data.

FactotumNOW Web Checking and Replication

Allocate a staging area on your network and replicate the Web files from there onto your Web servers. Operate with several Web servers by replicating one content source to several servers. Only one open port required between staging area and Web servers (TCP 5432). Detects duplicate files (even when they have different filenames) and only transmits them once. Compression during replication. Support for replication through FTP.

BCArchive

With BCArchive software you may encrypt and compress a group of files/folders to an encrypted archive (i.e. single file). You may store all you confidential files in such archive accessing it whenever you need it. All your files are encrypted, protected from unauthorized access. You may create self-extracted program containing encrypted archive and e-mail it to your friend. BCArchive uses strong encryption symmetric and asymmetric algorithms.

SecureWord

SecureWord was originally designed as the most convenient and fully functional program for storing important information such as logins, passwords and files. Modern and secure encryption algorithms, An improved security system, Convenient and easy interface, Quick and adjustable search system, The passwords generator and much more.

AcuteFinder

ActueFinder is a handy utility that finds duplicate files on your computer. You can then eliminate or move the files to an archive directory, thereby recovering a lot of disk space taken by these unnecessary copies. Uses CRC32 and MD5 to find identical files, with an option to search in ZIP-files also. List of duplicate files can be sorted, printed, exported and acted upon. Fast and easy way to clean up you disks!

Software Brat Clipboard Utility

The Software Brat Clipboard Utility allows the user to temporarily collect multiple clipboard items in a most recently used stack for recall when they are later needed. Duplicates are prevented. Any type of clipboard item can be temporarily saved and text and picture items previewed. An item can be returned to the clipboard by double clicking or pressing a button. Individual items can be easily deleted from the stack.

Dekart Private Disk Multifactor

Easy-to-use, secure and reliable AES 256-bit disk encryption software. Creates one or more virtual encrypted disks on your hard drive. Supports such portable storage devices like FDD, CD, CD/R, CD/RW, MO, MD, ZIP-disks, flash drives, all types of flash memory cards. Makes your important files invisible and protected from unauthorised access. Provides 100% protection of your private information.Can perform three-factor authentication.

Dekart Private Disk

Easy-to-use, secure and reliable AES 128-bit disk encryption software. Creates one or more virtual encrypted disks on your hard drive. Supports any external storage devices like FDD, CD, CD/R, CD/RW, MO, MD, ZIP-disks, flash drives, all types of flash memory cards. Makes your important files invisible and protected from unauthorised access. Provides 100% protection of your private information.

Hyper Hasher Suite

The Hyper Hasher Suite will fulfill all your file hashing needs. Hyper Hasher allows you to calculate 26 different hash/checksum and HMAC values for any file on your system, while the HashFile utility adds support for MD5 & SFV file creation and verification. These tools feature advanced options including a unique customizable interface, configuration saving, optional windows shell integration, Pentium 4 optimizations for speed, and much more!

Encoder Wizard ActiveX

Encoder Wizard is a collection of two ActiveX (ocx) controls, Encoder Wizard and Decoder Wizard. These two controls allow you to fully support the Base64, Quoted- Printable, UUEncode, yEnc, MD5,HMAC MD5, URL, SHA-1, and Binary 2 Hex encoding methods. You can Encode and Decode data quickly and intelligently.

SHA-1 Password

SHA-1 Password is a password recovery tool that can recover a password if you know its SHA-1 hash. SHA-1 Password features highly configurable and fast recovery engine that can process up to 32,000 hashes simultaneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are supported. The support for the distributed recovery technology allows you to utilize the power of multiple computers.

License&Security

Integrate licensing into your applications and maintain a database of your licensees. Protect your software against piracy by using hash, checksums, antidebugging and antimonitoring. As against many other products It gives the full control over debuggers and monitors. It includes functions of enciphering and the digital signature for using in your C/C ++, Delphi and VB programs.Simple in use and also has the detailed help with video tutorial.

MD5 Password

MD5 Password is a password recovery tool that can recover a password if you know its MD5 hash. MD5 Password features highly configurable and fast recovery engine that can process up to 32,000 hashes simultaneously. Brute-Force Attack, Dictionary Attack, Hybrid Dictionary Attack and Smart Force Attack are supported. The support for the distributed recovery technology allows you to utilize the power of multiple computers.

 

Copyright (C) 2003-2011 FilesLand.com