Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

CyoHash

Compare

  Analyzed 10 months ago

CyoHash is a simple shell extension that is used from within Windows Explorer to calculate the MD5 hash, SHA1 hash, or CRC32 checksum of a file.

5.54K lines of code

1 current contributors

over 1 year since last commit

1 users on Open Hub

Activity Not Available
0.0
 
I Use This
Licenses: No declared licenses

krhash

Compare

  Analyzed about 1 year ago

OverviewKrHash is a graphical, multi-platform and generic hash cracker. It's easy to use and let you crack a hash list. KrHash is: graphical -> easy to use cross-platform -> can use it on Linux, BSD, Windows and Mac generic -> easy to add some hashing algorithms and cracking ... [More] techniques It's written in C++ using Qt framework. KrHash is in an early stage of development but it is usable. Please fill out a ticket for found issues and requests. Screenshots [Less]

1.75K lines of code

0 current contributors

over 8 years since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This

md5hasher

Compare

  Analyzed about 1 year ago

DescriptionMD5 Hasher is a small windows tool that lets you find the md5 hash of a file and verify its originality. Features -Drag n' drop support Requirements -.NET Framework 3.5 (You can get it here)

0 lines of code

0 current contributors

over 8 years since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: GPL-2.0+

dope

Compare

  Analyzed about 1 year ago

Dope - A portable C implementation of a HashHash / Linked ListsAlmost everything I write requires some form of linked list, or more flexible array than C provides, perhaps because I'm too used to using PHP or HashMaps in Java, or perhaps it's the same for everyone. It's such a small amount of code ... [More] that you write it over and over without thinking about it. Dope can change that, while it's only a little bit of code it's incredibly useful, save yourself those 30 minutes every time you start a new project and go with a Hash that works and is thoroughly tested for leeks. [Less]

255 lines of code

0 current contributors

over 8 years since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This

infoarch-scripts

Compare

  Analyzed about 1 year ago

Python and bash scripts to manage the architecture of your informations, your files. There you'll find the following scripts: hashsync (aka "hash sync" or "hs"): sync two directories or do versioned backups detecting moved/renamed files to protect your data (with file moving detection sync is ... [More] quick also with very big multi gb files) hashdiff: check files integrity against "natural" corruption (but not against tampering) with md5 hash make_links.sh: make symlink (soft link) to files/directories with easy recover_links: recover symlinks if they becomes broken rsync-diff.sh: checksum-diff two dirs with rsync rsync-copy.sh: dry run copy, copy and checksum-diff a dir with rsync mytemplate.odt, mytemplate.doc: Openoffice and MSoffice templates containing scripts to manage documents backups and revisions ...and many more things, if I'll find inspiration and time Stefano Spinucci googlemail: virgo977virgo [Less]

0 lines of code

0 current contributors

over 7 years since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: GPL-3.0+

keimpx

Compare

  Analyzed about 1 year ago

keimpx is an open source tool, released under a modified version of Apache License 1.1. It can be used to quickly check for the usefulness of credentials across a network over SMB. Credentials can be: * Combination of user / plain-text password. Combination of user / NTLM hash. * Combination ... [More] of user / NTLM logon session token. If any valid credentials has been discovered across the network after its attack phase, the user is asked to choose which host to connect to and which valid credentials to use, then he will be prompted with an interactive SMB shell where the user can: * Spawn an interactive command prompt. * Navigate through the remote SMB shares: list, upload, download files, create, remove files, etc. * Deploy and undeploy his own service, for instance, a backdoor listening. [Less]

1.7K lines of code

0 current contributors

about 5 years since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This

md5 cracker

Compare

  Analyzed 7 months ago

I finished my C md5 cracker finally, it's pretty fast but not comparable to that uses the GPU or those made in some scripting language. It uses a not casual brute force and takes three command line arguments:

630 lines of code

1 current contributors

9 months since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This