ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 Next » Displayed: 1 - 25 of 53
Sort by:  relevance | title | downloads | rating | date
Md5deep screenshot
Md5deep 4.4   
... - md5deep can accept a list of known hashes and compare them to a set of input ... input files that match the list of known hashes or those that do not match. Hashes sets ...
Freeware

Another Redis Desktop Manager
Another Redis Desktop Manager 1.7.0   
... such as strings, lists, sets, sorted sets, and hashes. The intuitive key tree view simplifies the process of navigating through large datasets, making it easier to locate and manipulate specific ...
Open Source

Hash Generator

Hash Generator 9.0   
... automates the generation of 15+ different type of hashes or checksums. It support most of the popular hashes including MD5 family, SHA family, BASE64, CRC32, ROT13, ... drag files onto the tool for hash generation. Hashes or checksums are mainly used for file integrity ...
Freeware

Whirlpool File Checker 64-bit
Whirlpool File Checker 64-bit 0.1   
... checker uses Alternate Data Streams to store the hashes of your files. So, it only works on ... files (to another NTFS volume) without losing the hashes, and without needing to do anything else. ...
Freeware

Sysmon
Sysmon 15.15   
... detailed, providing valuable context such as process IDs, hashes, and command-line arguments, which are crucial for in-depth investigations. Sysmon's integration with other Sysinternals tools and Windows Defender Advanced Threat ...
Freeware

Ninite
Ninite   
... each publisher's official site verify digital signatures or hashes before running anything work best if you turn off any web filters or firewalls save you a lot of time! ...
Freeware

wodCrypt
wodCrypt 2.2.5   
... and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it ...
Shareware | $139.00

WinHasher
WinHasher 1.6.2.67   
... OpenSSL includes several command-line components for generating cryptographic hashes and there are number of graphical user interface ... does not include any built-in utilities for cryptographic hashes, and installing and using OpenSSL on Windows is ...
Open Source

DevToys
DevToys 1.0.13.0   
... includes utilities for generating secure passwords, calculating cryptographic hashes (MD5, SHA-1, SHA-256), and even encoding and decoding JWT tokens. These tools help developers implement and maintain high security standards in ...
Open Source

DoublePics
DoublePics 3.07   
... that the research is not only based on hashes, but on the excellent DoublePics image pattern processor. ...
Freeware

DC++
DC++ 0.881   
... files per your organization scheme * Tiger Tree Hashes (TTH) used for file integrity * Search across all (or selected) connected hubs by file type, size, name or hash * ...
Open Source

X-DCPlusPlus
X-DCPlusPlus 0.831 [rev12]   
... bookmark-like favorite hubs and users · Tiger Tree Hashes (TTH) used for file integrity · Search across all (or selected) connected hub by type, size, or name · Resume of ...
Open Source

FireFTP screenshot
FireFTP 2.0.32   
... supports directory comparisons and synchronization, time-stamp syncing, file hashes, and auto-reconnect. After 13 years and 25 ... accounts · Remote Editing · File Hashing: Generate hashes of files (MD5, various SHA's) · Drag & ...
Freeware

Tresorit
Tresorit 3.5.2475.1420   
... by HMAC message authentication codes applied on SHA-512 hashes. Encrypted files are uploaded to the cloud using TLS-protected channels. Everything can be ‘tresored’ Tresorit secures your files and ...
Freeware

Anti-Spam SMTP Proxy Server
Anti-Spam SMTP Proxy Server 2.8.1 Build 24261   
... and signing V2 - DB support for all hashes / level based open plugin support V2 - transparent proxy support / BATV check and signing V2 - Plugins: archive, full ...
Open Source

Cryptnos
Cryptnos 1.3.3   
... help you generate strong, pseudo-random passwords using cryptographic hashes. Cryptnos combines a unique "site token" such ... parameters securely in the Windows registry using cryptographic hashes and strong AES-256 encryption Cross-platform import/export mechanism allows ...
Open Source

MD5 Checksum Tool
MD5 Checksum Tool 4.7   
MD5 Checksum Tool is a smart and easy to use Windows OS application designed to allow users to generate the file checksum (MD5/SHA hash) of a file or string. It can ...
Trialware

Appnimi SHA384 Decrypter
Appnimi SHA384 Decrypter 1.0   
Appnimi SHA384 Decrypter helps in decrypting any SHA384 hash. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true SHA384 Decrypter available ...
Freeware

AUTHENTiC The Checksum Calculator
AUTHENTiC The Checksum Calculator 1.0.1   
... it might sound! If you need to calculate hashes for an algorithm which is not included, please contact me and I'll try to include it in future versions. ATTENTION: v1.0.1. ...
Freeware

FileHash
FileHash 6.0.0.1400   
... efficient tool designed to compute and verify file hashes. This software caters to users who require a ... significant performance degradation, ensuring that users can compute hashes quickly even for extensive datasets. Additionally, FileHash supports ...
Freeware

JRecoverer for MySQL Passwords
JRecoverer for MySQL Passwords 1.5.0   
... brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks (using rainbow tables). Generation of reports about recovered passwords: account list, charts and metrics. ...
Shareware | $55.00

JRecoverer for Oracle Database Passwords
JRecoverer for Oracle Database Passwords 1.4.1   
... brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks (using rainbow tables). Generation of reports about recovered passwords: account list, charts and metrics. ...
Shareware | $55.00

Hash Suite
Hash Suite 4.0   
... memory requirements even when attacking a million of hashes at once. The GUI is simple yet uses modern features offered by Windows 7 and above. Besides the password security auditing ...
Shareware | $39.95

Hyperball
Hyperball 1.0.0.1   
... VirusTotal infrastructure, the application can analyze files, MD5 hashes and URLs. The PE information module analyzes the application’s file headers to extract key information about the file compiler and packer. ...
Freeware

Hash Console
Hash Console 1.5   
... quickly generate more than 15 different type of hashes. It can generate hash for any given file or simple text. Hashes or checksums are used for multiple purposes including ...
Freeware
Results Page: 1 2 3 Next » Displayed: 1 - 25 of 53
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags