Showing 22 open source projects for "sha3"

View related business solutions
  • Orchestrate Your AI Agents with Zenflow Icon
    Orchestrate Your AI Agents with Zenflow

    The multi-agent workflow engine for modern teams. Zenflow executes coding, testing, and verification with deep repo awareness

    Zenflow orchestrates AI agents like a real engineering system. With parallel execution, spec-driven workflows, and deep multi-repo understanding, agents plan, implement, test, and verify end-to-end. Upgrade to AI workflows that work the way your team does.
    Try free now
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1

    Largest Generic Hash and HMAC Program

    57 Hash Functions In One Program, plus each with HMAC or KMAC

    ...FEHASHMAC contains a set of known test vectors and results for each algorithm such that the correct implementation for each hardware platform and compiler version can directly be verified. Currently 57 hash algorithms like sha1 sha224 sha256 sha384 sha512 and variants, sha3 and shake, all SHA3 finalists and blake3, md2 md4 md5 md6, rmd128 rmd160 rmd256 rmd320, whirl gost lash160 lash256 lash384 lash512 tiger2 and RFC 2104 HMAC and KMAC support are included, plus SHA3 extensions kmac128, kmac256, kmacxof128, kmacxof256 for message.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Plum Cave Twofish

    Plum Cave Twofish

    A version of Plum Cave that uses the ChaCha20 and Twofish ciphers

    A version of Plum Cave that employs the "ChaCha20 + Twofish-256 CBC + HMAC-SHA3-512" authenticated encryption scheme for data encryption and ML-KEM-1024 for quantum-resistant key exchange.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Plum Cave

    Plum Cave

    A cloud backup solution that employs advanced cryptography

    A cloud backup solution that employs the "ChaCha20 + Serpent-256 CBC + HMAC-SHA3-512" authenticated encryption scheme for data encryption and ML-KEM-1024 for quantum-resistant key exchange. Check it out at https://plum-cave.netlify.app/ GitHub page: https://github.com/Northstrix/plum-cave
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    RHash
    RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BTIH, Tiger, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool.
    Leader badge
    Downloads: 1,126 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 5

    Tiny Password Manager

    Password Manager in a Single Source File

    Password Manager in a Single Source File
    Downloads: 2 This Week
    Last Update:
    See Project
  • 6
    Blueberry Loom

    Blueberry Loom

    Cryptographically reinforced form builder

    A form builder that utilizes ML-KEM-1024, as well as the "ChaCha20 + Serpent-256 CBC + HMAC-SHA3-512" authenticated encryption scheme to enable end-to-end encryption for enhanced data protection. GitHub repository: https://github.com/Northstrix/blueberry-loom
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    mendelson OFTP2

    mendelson OFTP2

    Implementation of the OFTP2 protocol (RFC 5024)

    The mendelson OFTP2 is a JAVA-based open source OFTP2 solution. It contains a logging- and configuration GUI (SWING) and supports encryption, digital signatures, message compression, TLS, certificate exchange, message routing, mail notification
    Leader badge
    Downloads: 41 This Week
    Last Update:
    See Project
  • 8
    xSum Hash Utility

    xSum Hash Utility

    Command-line utility for Windows which generates and verifies the hash

    ...Users can easily verify that your release is authentic and belongs to you by verifying both the file hashes, and the GPG key. Files that have been tampered with will return a warning to the user. Supported Algorithms: - CRC-8, 16, 32 - MD5 - SHA1 - SHA2-256, 384, 512 - SHA3-128, 224, 256, 384, 512 - Blake2b-128, 160, 256, 384, 512 - Blake2s-128, 160, 256, 384, 512 For a full explanation of using xSum, read https://github.com/Aetherinox/xsum-hash-utility/wiki/Getting-Started
    Downloads: 2 This Week
    Last Update:
    See Project
  • 9
    RHash for Windows

    RHash for Windows

    RHash (Recursive Hasher) v1.4.0 for Windows 32-bits

    RHash (Recursive Hasher) is a console utility for calculation and verification of magnet links and various message digests, including CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BitTorrent BTIH, Tiger, GOST R 34.11-94, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool. Message digests are used to ensure and verify integrity of large volumes of data for a long-term storing or transferring. by Aleksey Kravchenko.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
    Learn More
  • 10

    Fox Encoder

    Multipurpose Encoder/decoder

    Encode / Decode (from and to) text, hex, base64. Also supports hash function including MD4, MD5, SHA1, SHA2, SHA3, Keccak including most lengths (224, 256, 384 and 512),
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11

    HashOR

    HashOR is used to create 84 hashes of a string or file.

    HashOR can create 84 hashes from data or file input. It also can create a TTH and AICH.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 12
    GMR Digital Signature System

    GMR Digital Signature System

    GMR digital signature system

    Private keys are insecure in cloud server infrastructure. Chrome: right click - translate into English! https://www.bsi.bund.de/DE/Presse/Pressemitteilungen/Presse2018/Spectre-NG_18052018.html System that creates key pairs and digital signatures and is based on the presumed difficulty of prime factorization. Please install on a virtual machine with Linux! Windows is not supported! German: System, das Schlüsselpaare und digitale Signaturen erstellt, und auf der vermuteten...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Open-Hashtool

    Open-Hashtool

    Comfortable hash-tool for texts and files

    Open-Hashtool is an easy2use Qt based application, which can be used to calculate the hash (MD4; MD5; SHA-1; SHA-224; SHA-256; SHA-384; SHA-512; SHA3-224; SHA3-256; SHA3-386; SHA3-512) of texts and files. It's compatible with Windows and Linux. But Linux users need Qt5.1 or Wine (configuration: Windows Version <= Windows 2008) to run the Open-Hashtool. Please read the Wiki for compiling instructions.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 15

    PeaUtils

    File management utilities: split & join, secure delete, crc/hash

    Suite of file management utilities: split and join files, secure delete, verify checksum and hash values: CRC32. MD5, SHA1, SHA-256, SHA3 and more. Spin-off of PeaZip project.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 16
    CryptBench

    CryptBench

    A Benchmark which tests CPU cryptography performance

    ...Following Cipher/Hash Functions are used to generate a final CryptScore for the given CPU: 1. AES-256 2. Blowfish 3. Camellia-256 4. IDEA 5. Chacha20 6. SHA-512 7. SHA3-512(Keccack) 8. MD5 9. Blake2b 10. Whirlpool By default the application uses a buffer size of 256MiB and each test runs for 2 secs(per library test). CryptBench uses Libcpuid for CPU info.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    akmos

    Cryptography toolset

    Command line utility for encryption/decryption files, computing message digests
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Secure Hash Algorithm variant of the nist maintained Secure Hash Algorithm. this is a 1024 bit digest. Comments suggestions always welcome. Rick Removed old downloads as they are long outdated. The update is the last version I worked on. Algorithm is based on the SHA2 digest. I may work on an updated version for c++11
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Detailed Presentation of the GROESTL hash function, finalist to the SHA-3 competition organized by the NIST to decide which cryptographic hash algorithm will replace the famous SHA-2.I analyze and present the candidate algorithm I bet on since the beginning of the competition.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    file hashing

    this is a simple program to hash files

    this program can use 6 different hashs. its not the best but dont care. it uses SHA1 , SHA2 , SHA3 , SHA4 , MD5 , CRC32. its 100% open source so enjoy.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    Cryptkeeper

    Cryptkeeper Secuirty tool

    In this program you will find tools like : Rawdata tool , file encryption , text encryption , program updater , program protecter , password manager , program settings , defult settings , settings viewer and the last is the file hashing. the file hashing you can use 6 hashing types for the file encryption 1 since i ran out of time for it , and the text encryption has 17 different types 12 encrypt and 5 hashing types. some uses encryption keys and some dont. there are AES , 4DES , RC2 , RC4 , MD5 , SHA1 , SHA2 , SHA3 , SHA4 , XoR , Crypt , HeX , BINARY , Rijndael 256 , Obfuscation String , RSA , BASE64. The password manager anything saved WILL NOT BE ENCRYPTED so it is smart to protect the program from others not using it.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next