Featured 

Sha-1

Software
MOBILedit! Forensic Support Libraries
rating
108
COMPELSON Labs
MOBILedit! Forensic Support Libraries for MOBILedit...
Improved XML export with SHA-512 checks
DP Hash
free rating
30
Dirk Paehl
Dp Hash is the succession from DPASHA. This program supported at this time the following hash: adler32, crc16...
EDonkey, MD2, MD4, MD5, SHA, SHA1, SHA256, SHA384, SHA512
Silent Hill Alchemilla
free rating
27
moDBolical Pty. Ltd.
Alchemilla Mod is an attempt to recreate the original atmosphere of the cult game...
Alchemilla Mod is an attempt to recreate the original atmosphere of the cult game
TurboPower LockBox
free rating
26
Sean B. Durkin
TurboPower LockBox 3 is a FOSS Delphi Cryptographic Library, providing efficient private key encryption...
DES, 3DES, Blowfish, Twofish, SHA, MD5
Ultra Crypto Component
rating
12
Utralshareware Software
Easy and advanced encryption, decryption and hash ActiveX component for ASP or ASP.Net Support encryption...
algorithm like MD5, SHA Ultra Crypto Component...like MD2, MD4, MD5, SHA, SHA256, SHA384, SHA512
Japplis Toolbox
free rating
8
Japplis
Japplis Toolbox is a compilation of text utilities in one application...
hash code, MD5 or SHA. You can get Java
Prohash
free rating
5
Machine Script, Co., Ltd
Prohash home checksum calculator. Computes hash values of strings and files...
Supports 39 algorithms including SHA-512
Cubelox Hash
free rating
4
Cubelox
Cubelox Hash is the new solution by Cubelox that gives you the capability...
MD5 (Message-Digest Algorithm 5) - SHA Algorithms (Designed
MarshallSoft Delphi AES Library
rating
4
MarshallSoft Computing
AES Encryption library provides a simple interface to encrypt/decrypt files...
(Electronic Cookbook) mode. Supports SHA-256 cryptographic hash algorithm
Efficient Diary Network
rating
4
Efficient Software
Specially designed for small to medium work groups to share data! To casting your unique corporate culture!
the irreversible algorithm of SHA; besides, the content
Efficient Password Manager Network
rating
4
Efficient Software
Efficient Password Manager Network is a powerful password management application. It is specially designed...
encrypted by the irreversible SHA algorithm, while the password
JSummer - java-build
free rating
3
zero-sys.net Klaus Zerwes
It contains: - a console-tool compatible to the GNU md5sum and sha1sum - grafical interface...
MD4, MD2, SHA-160, SHA-256, SHA-384, SHA-512, RIPEMD128, RIPEMD160
SecExMD5+
rating
1
Bytefusion Ltd.
SecExMD5+ generates message digest signatures of files. Message digests are digital fingerprints...
common standards are MD5, SHA-1 and RIPEMD-160. SecExMD5
File Hash Shell
free rating
1
McKechney
File hashes are used to verify the authenticity and integrity of files...
are presented with the SHA-1 Hash ...are generated using the SHA-1 encryption algorithm
APP/Encrypt
rating Nonnoi Solutions
APP/Encrypt is a COM+/MTS component that allows application developers to strong encrypting...
MARS, IDEA, Haval, MD5, SHA-1, SHA-512, Tiger, RipeMD-160
Sign Server
free rating Prime Key
It is an application for server side signatures called by other systems...
algorithms for signatures, MD5, SHA-1, SHA-2. Compliant
Tray Safe
rating F-Group Software
Tray Safe password manager that allows you to forgot passwords! It will save and protect...
algorithms, like 3DES, Blowfish, SHA, MD5. Tray Safe password
Hash Console
free rating SecurityXploded
Command-line based all-in-one Hash generation...
family (md2, md4, md5) # SHA family (sha1, sha256, sha384
MarshallSoft Advanced Encryption Standard (AES) Library
rating MarshallSoft Computing
AES Encryption library provides a simple interface to encrypt/decrypt files, strings or data from Visual Foxpro programs...
(Electronic Cookbook) mode. Supports SHA-256 cryptographic hash algorithm
MarshallSoft Visual dBase AES Library
rating MarshallSoft Computing
AES Encryption library provides a simple interface to encrypt/decrypt files...
(Electronic Cookbook) mode. Supports SHA-256 cryptographic hash algorithm

Tags

Files Hash Tool Text Component Java Encrypt Encryption Blowfish Regular expressions