ePrivacy and GPDR Cookie Consent by Cookie Consent

Related Tags

Popular x64 Tags

Results Page: 1 2 3 Next » Displayed: 1 - 25 of 55
Sort by:  relevance | title | downloads | rating | date
Hash Suite
Hash Suite 4.0   
... memory requirements even when attacking a million of hashes at once. The GUI is simple yet uses modern features offered by Windows 7 and above. Besides the password security auditing ...
Shareware | $39.95

JRecoverer for Oracle Database Passwords
JRecoverer for Oracle Database Passwords 1.4.1   
... brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks (using rainbow tables). Generation of reports about recovered passwords: account list, charts and metrics. ...
Shareware | $55.00

Ninite
Ninite   
... each publisher's official site verify digital signatures or hashes before running anything work best if you turn off any web filters or firewalls save you a lot of time! ...
Freeware

Another Redis Desktop Manager
Another Redis Desktop Manager 1.7.0   
... such as strings, lists, sets, sorted sets, and hashes. The intuitive key tree view simplifies the process of navigating through large datasets, making it easier to locate and manipulate specific ...
Open Source

wodCrypt
wodCrypt 2.2.5   
... and verifying signatures, and MD5 SHA1 for creating hashes. Working with Blobs wodCrypt works with Blobs - Binary Large Objects (it doesn't have to be big, of course) when it ...
Shareware | $139.00

WinHasher
WinHasher 1.6.2.67   
... OpenSSL includes several command-line components for generating cryptographic hashes and there are number of graphical user interface ... does not include any built-in utilities for cryptographic hashes, and installing and using OpenSSL on Windows is ...
Open Source

Md5deep screenshot
Md5deep 4.4   
... - md5deep can accept a list of known hashes and compare them to a set of input ... input files that match the list of known hashes or those that do not match. Hashes sets ...
Freeware

DevToys
DevToys 1.0.13.0   
... includes utilities for generating secure passwords, calculating cryptographic hashes (MD5, SHA-1, SHA-256), and even encoding and decoding JWT tokens. These tools help developers implement and maintain high security standards in ...
Open Source

DoublePics
DoublePics 3.07   
... that the research is not only based on hashes, but on the excellent DoublePics image pattern processor. ...
Freeware

DC++
DC++ 0.881   
... files per your organization scheme * Tiger Tree Hashes (TTH) used for file integrity * Search across all (or selected) connected hubs by file type, size, name or hash * ...
Open Source

X-DCPlusPlus
X-DCPlusPlus 0.831 [rev12]   
... bookmark-like favorite hubs and users · Tiger Tree Hashes (TTH) used for file integrity · Search across all (or selected) connected hub by type, size, or name · Resume of ...
Open Source

FireFTP screenshot
FireFTP 2.0.32   
... supports directory comparisons and synchronization, time-stamp syncing, file hashes, and auto-reconnect. After 13 years and 25 ... accounts · Remote Editing · File Hashing: Generate hashes of files (MD5, various SHA's) · Drag & ...
Freeware

Tresorit
Tresorit 3.5.2475.1420   
... by HMAC message authentication codes applied on SHA-512 hashes. Encrypted files are uploaded to the cloud using TLS-protected channels. Everything can be ‘tresored’ Tresorit secures your files and ...
Freeware

Anti-Spam SMTP Proxy Server
Anti-Spam SMTP Proxy Server 2.8.1 Build 24261   
... and signing V2 - DB support for all hashes / level based open plugin support V2 - transparent proxy support / BATV check and signing V2 - Plugins: archive, full ...
Open Source

Hash Generator

Hash Generator 9.0   
... automates the generation of 15+ different type of hashes or checksums. It support most of the popular hashes including MD5 family, SHA family, BASE64, CRC32, ROT13, ... drag files onto the tool for hash generation. Hashes or checksums are mainly used for file integrity ...
Freeware

Cryptnos
Cryptnos 1.3.3   
... help you generate strong, pseudo-random passwords using cryptographic hashes. Cryptnos combines a unique "site token" such ... parameters securely in the Windows registry using cryptographic hashes and strong AES-256 encryption Cross-platform import/export mechanism allows ...
Open Source

MD5 Checksum Tool
MD5 Checksum Tool 4.7   
MD5 Checksum Tool is a smart and easy to use Windows OS application designed to allow users to generate the file checksum (MD5/SHA hash) of a file or string. It can ...
Trialware

Appnimi SHA384 Decrypter
Appnimi SHA384 Decrypter 1.0   
Appnimi SHA384 Decrypter helps in decrypting any SHA384 hash. In appropriate infrastructure it works at a speed of more than 1 million words/second. One of the fastest true SHA384 Decrypter available ...
Freeware

AUTHENTiC The Checksum Calculator
AUTHENTiC The Checksum Calculator 1.0.1   
... it might sound! If you need to calculate hashes for an algorithm which is not included, please contact me and I'll try to include it in future versions. ATTENTION: v1.0.1. ...
Freeware

FileHash
FileHash 5.3.0.1281   
... efficient utility designed to generate and verify file hashes with ease. This software stands out in the ... use the traditional file selection dialog, to generate hashes quickly. The real-time feedback and progress indicators ensure ...
Freeware

SoftFuse Password Generator Pro
SoftFuse Password Generator Pro 2.7   
... of time automatically. Built-in hash generator outputs passwords' hashes in MD5/SHA-1/SHA-2. The entire password's database is kept in a single portable file which could be stored on your secured flash-disk ...
Shareware | $39.95

SoftFuse Password Generator Free
SoftFuse Password Generator Free 2.5   
... program designed to generate random passwords and passwords' hashes in a second. Using this free password generator, you can easily create complex random passwords up to 128-character length. While generating ...
Freeware

JRecoverer for MySQL Passwords
JRecoverer for MySQL Passwords 1.5.0   
... brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks (using rainbow tables). Generation of reports about recovered passwords: account list, charts and metrics. ...
Shareware | $55.00

Hyperball
Hyperball 1.0.0.1   
... VirusTotal infrastructure, the application can analyze files, MD5 hashes and URLs. The PE information module analyzes the application’s file headers to extract key information about the file compiler and packer. ...
Freeware

Hash Console
Hash Console 1.5   
... quickly generate more than 15 different type of hashes. It can generate hash for any given file or simple text. Hashes or checksums are used for multiple purposes including ...
Freeware
Results Page: 1 2 3 Next » Displayed: 1 - 25 of 55
Sort by:  relevance | title | downloads | rating | date

Members area

Login:
Password:
Remember me

Sign Up  |  Forgot Password?

Top 64-bit Downloads

Top Downloads

64-bit Tags