Sha 1 Algorithm Softwares

Best Softwares Hash Algorithm Checksum Utility

1
SHA-1 Password
SHA-1 Password
By LastBit Software : Yahoo password hack
SHA-1 Password is a password recovery tool for security professionals, which can be used to recover a password if its SHA-1 hash is known. SHA-1 (Secure Hash Algorithm) is an industry standard hash algorithm that ...
2
SHA PadLock
SHA PadLock
By Broheim : Time lock padlock
SHA Padlock computes SHA-1 or SHA-256 file checksums using VIA Nano`s processors hardware PHE engine. Currently it can only be run on VIA Nano processors (in Samsung NC20 netbook for example) under Windows. It was ...
3
JavaScript SHA-256
JavaScript SHA-256
By : Javascript
The SHA (Secure Hash Algorithm) is one of the many cryptographic hash functions. It is suggested that SHA256 or greater must used for critical technology. This script is used to Process variable length message into ...
4
SHA-1 Hash Checker
SHA-1 Hash Checker
By stoneass : Sha
This is an offline tool to help you check whether your password has been compromised by hackers. What you do is enter a phrase (e.g. a password), and it will generate a SHA-1 hash for ...
5
Ashs MD5/SHA-1 Checker
Ashs MD5/SHA-1 Checker
By Ashberk : Decrypt md5
A graphical tool for creating and checking MD5 and SHA-1 checksums. Comes with a convenient Batch mode. Works also from the command-line. Written in Java/Swing as a comfortable tool for your file checks.
6
MD5 & SHA-1 Checksum Utility
MD5 & SHA-1 Checksum Utility
By Raymond's Personal Software : Checksum
MD5 & SHA-1 CheckSum Utility is a standalone freeware that can generate a MD5 & SHA-1 hash from a file.In addition, you can verify the Hash to ensure the file integrity is correct with the ...
7
MD5 & SHA Checksum Utility
MD5 & SHA Checksum Utility
By Raymond Lin :
The MD5 & SHA Checksum Utility is a tool developed by Raymond Lin. With this
8
dsSHA produces SHA-1 digital file signature
dsSHA produces SHA-1 digital file signature
By Dariusz Stanislawek : E signature
dsSHA produces SHA-1 digital file signature. Like CRC or MD5 it can be used for detection of file tampering by viruses, hackers, etc. and integrity verification of copied or downloaded files. dsSHA is so small ...
9
Algorithm
Algorithm
By Algorithm : Create your program
Do you want to Create your own programo or game? Algorithm2 is a free tool for game and software development at home. Algorithm2 is a fully visual RAD system but it is not a strict ...
10
Algorithm of the Gods
Algorithm of the Gods
By eurosoft : Visual basic
In the March 1997 issue of Scientific American, Shawn Carlson described a remarkable Algorithm for tackling challenging problems, like the Travelling Salesman problem, by adopting the approach "Nature uses" when a metal anneals or when ...
11
Hungarian Algorithm
Hungarian Algorithm
By : Genetic algorithm matlab
This Algorithm allows you to find the minimum weight matching of a bipartite graph. The graph can be of arbitrary size and connectedness. The edge weights are captured by a MxN weight Matrix where an ...
12
Algorithm Elf
Algorithm Elf
By Dashingsoft Corp. : Teaching
A graphical way to show the implementation Process of the most data structure algorithms. Applicable to the production of algorithms course and help the students understanding of the software Algorithm for the implementation process. Algorithm ...
13
Porter Stemming Algorithm
Porter Stemming Algorithm
By : Genetic algorithm matlab
This is a Script for PHP
14
Shell Sort Algorithm
Shell Sort Algorithm
By : Ssh secure shell 3.2.9
Shows how an array can be sorted using Shell Sort Algorithm.
15
Rainflow Counting Algorithm
Rainflow Counting Algorithm
By : Genetic algorithm matlab
The rainflow Algorithm code has been prepared according to the ASTM standard (Standard practices for cycle counting in fatigue Analysis) and optimized considering the calculation time.


Secure Hash Hash Algorithm Secure Hash Algorithm

1
jsSHA
jsSHA
By Brian Turek : Variants of
jsSHA is a JavaScript implementation of all variants of the SHA family of hashes (SHA-1, SHA-224, SHA-256, SHA-384, SHA-512) as well as HMAC.
2
sha_digest
sha_digest
By Jens Thoms Toerring : Operating system
The sha_digest package is a C implementation of the Secure Hashing Algorithms SHA-1, SHA-224, SHA-256, SHA-384 and SHA512 as described in FIPS PUB 180-3, published in October 2008. You can either use the result as ...
3
xCELLhash
xCELLhash
By FullScope Solutions, LLC : Laptop software
xCELLhash is an Add-In that allows users to perform one-way hash functions (e.g. MD5, SHA-1, SHA-2) on data stored in Microsoft Office Excel workbooks. xCELLhash implements the MD5, SHA-1, SHA-256, SHA-384, and SHA-512 algorithms and ...
4
CheckIt
CheckIt
By lovinglinux : Compare it
Allows to compare a file CheckSum with a selected checksum from a web site, through the context menu. CheckIt allows to select a checksum Posted on a web site and compare it with a downloaded ...
5
MemoPassword
MemoPassword
By Michel Prunet : Free internet surfing
MemoPassword is a user-friendly tool allowing you to store password and files securely. Password are stored encrypted using public Algorithm like RSA or AES. You can categorized your password in Folders. You can also generate password, ...
6
HS File Hasher
HS File Hasher
By Hein Smith : Pub file viewer
A file hasher written in java 1.6 capable of generating MD5, CRC32, SHA-1, SHA-256, SHA-384 and SHA-512 checksums of any file as well as comparing generated checksums. Requires Java Runtime Environment 1.6 Features:Calculate MD5, CRC32, ...
7
Hash Password Generator
Hash Password Generator
By Tim Anderson : Yahoo password hack
Generates passwords using multiple algorithms(SuperGenPass, PwdHash, Magic Password Generator, MD2, MD5, SHA-1, SHA-256, SHA-384, SHA-512). Also fills in email addresses and usernames.
8
SHA-1 Password
SHA-1 Password
By LastBit Software : Yahoo password hack
SHA-1 Password is a password recovery tool for security professionals, which can be used to recover a password if its SHA-1 hash is known. SHA-1 (Secure Hash Algorithm) is an industry standard hash algorithm that ...
9
Hash Calculator
Hash Calculator
By Dhruva Sagar : Scientific calculator
This is a Hash Calculating tool that calculates MD2,MD5,SHA-1,SHA-256,SHA-384,SHA-512 hash of text or a file. This has GUI developed in java swings.
10
Hash Cracker
Hash Cracker
By Dhruva Sagar : Brute force
Hash Cracker is a Java based application designed to help you crack MD2, MD5, SHA-1, SHA-256, SHA-384, SHA-512 hashes either using brute force or using wordlists of the user`s choice based on the users choice.
11
Winrtgen
Winrtgen
By Massimiliano Montoro : Key generator
Winrtgen is a graphical Rainbow Tables Generator that supports LM, FastLM, NTLM, LMCHALL, HalfLMCHALL, NTLMCHALL, MSCACHE, MD2, MD4, MD5, SHA1, RIPEMD160, MySQL323, MySQLSHA1, CiscoPIX, ORACLE, SHA-2 (256), SHA-2 (384) and SHA-2 (512) hashes.
12
JChecksum
JChecksum
By Josh Walters : Drag and drop
JChecksum is a simple and easy to use program that allows you to find the hash (also known as CheckSum) of a given file. JChecksum currenetly supports MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512. JChecksum ...
13
Karens Hasher
Karens Hasher
By Karen Kenworthy : Verify MD5
Compute and verify the MD5, SHA-1, SHA-224, SHA-256, SHA-384 or SHA-512 Hash Value of any text String, disk file, or group of files A Hash Value is a sort of digital Fingerprint, uniquely identifying each ...
14
SHA PadLock
SHA PadLock
By Broheim : Time lock padlock
SHA Padlock computes SHA-1 or SHA-256 file checksums using VIA Nano`s processors hardware PHE engine. Currently it can only be run on VIA Nano processors (in Samsung NC20 netbook for example) under Windows. It was ...
15
VSCryptoHash
VSCryptoHash
By lokibit.com : Automated encryption
VSCryptoHash is a cryptographic hash calculation software. Simply drag and drop files (or type the text) in this calculator and hash String for the files (or for entered text) will be immediately displayed. Great tool ...

Secure Hash Hash Algorithm Secure Hash Algorithm