algorithms downloads
Paranoia Text Encryption for PC
15.0.4 download... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro ...
CrococryptMirror
1.43a download... mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) ...
CrococryptMirror Portable
1.43b download... mirrors complete folders to encrypted folders. The encryption algorithms that are used are AES and Twofish (256 bits, cascading). The keyfile is secured by a password using PKCS #5 (PBKDF2) ...
FSS Plagiator
1.0.6.7 downloadFSS Plagiator uses advanced algorithms for text modifications without visual changes. The app is designed specially for students of various educational institutions: schools, colleges, universities, etc. Minimalistic interface of FSS ...
WinDataReflector Portable 64 bit
3.10.1 download... that wraps up fast file comparison and transfer algorithms into a simple and clear interface that offers you visual comparison of files and folders before synchronizing and backing them up ...
xCELLhash
2.3 download... implements the MD5, SHA-1, SHA-256, SHA-384, and SHA-512 algorithms and returns data as hexadecimal strings. xCELLhash also supports the hashing of files; select a file or provide the path to ...
HashTab
6.0.0.28 download... to calculate file hashes and supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool. It provides an easy drag and drop interface to simplify the process ...
VSTextHash
1.0.3.65 download... lets you hash text with many different hash algorithms. Simply type the text in this calculator and hash string for entered text will be immediately displayed. VSTextHash supports a variety ...
AceErase
2.0 download... History Eraser privacy tool. Several powerful file shredding algorithms (DOD strength & stronger) permanently delete, wipe, & erase your files, folders, recycle bin, free space, internet browsing history, cache, cookies, ...
Cyber Prot
4.1.1.53 download... safe from ransomware attacks. The software uses advanced algorithms and behavioral analysis to detect potential ransomware threats, and it blocks them before they can cause harm. Additionally, Cyber Prot automatically ...
Black Bird Cleaner
1.0.4.3 download... trash than others! Due to a completely new algorithms and a completely different approach, Black Bird Cleaner cleans more trash than others. Clear cache in more than 50 browsers Unlike ...
Mailing List Wizard
3.1 download... excluding duplicated addresses, correcting misspelled addresses using unique algorithms, filtering lists by varied criteria, merging lists, and making exclusions from address lists using an additional list. MLW can supplement mailing ...
Kiwi FREE PDF Comparer
2.0.0 downloadKiwi is a powerful software that uses advanced algorithms, many of them created specifically for this, to detect and show differences between two PDF documents. It's designed to review different ...
SysInfo Exchange BKF Recovery
2.0 download... data. This tool uses a highly advanced recovery algorithms and recovers the maximum possible data. No technical knowledge is required while using this tool. Exchange BKF Repair from SysInfoTools is ...
Paranoia Text Encryption for Mac
15.0.4 download... unwanted readers. Texts are encrypted using strong encryption algorithms: AES (Rijndael) 256bits, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro ...
Hashtoolbox
1.0 download... is able to calculate files with common hashing algorithms such as: MD4, MD5, SHA, SHA-256 and SHA-512. This utility aims to make it quick and easy to grab hashes for ...
Ultra Grayscale Converter
1.2 download... converts your images to grayscale fast, using different algorithms. It is a windows application and it runs on both 32bit and 64bit systems. Ultra Grayscale Converter is portable which means ...
AUTHENTiC The Checksum Calculator
1.0.1 download... The current version (1.0.1) supports 15 different hashing algorithms. You can validate files with: MD5, SHA1, Adler-32, Blake2b, Blake2s, CRC32, RIPEMD-160, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384 and SHA3-512. ...
PassFixer 7Z Password Recovery
3.5 download... recover 7z password, various sorts of password restoration algorithms are offered in this 7ZIP file Password Recovery Tool. These are known as Brute Force Attack, Mask Attack, and Dictionary Attack. ...
Metamorphosec String Hash Generator
3.1.0 download... hashes for specified string. It supports 95 hash algorithms. It also supports string properties (i.e. Lines, Words, Characters (with spaces), Characters (no spaces), Bytes) and string hex dump. It accommodates ...
Metamorphosec File Hash Checker
4.2.1 download... from single file. It supports 4 popular hash algorithms, i.e. MD5, SHA1, SHA256, and SHA512. It also can verify hash from checksum file. It supports two naming of checksum files, ...
Metamorphosec File Hash Generator
2.0.0 download... hashes from specified file(s). It supports 95 hash algorithms. It also supports file properties and hex dump. It accommodates to sort results by algorithm name and length, either in ascending ...
S.S.E. File Encryptor for Mac
15.0.6 download... application window. Files are encrypted using strong encryption algorithms: AES (Rijndael) 256bit, RC6 256bit, Serpent 256bit, Blowfish 448bit, Twofish 256bit, GOST 256bit + (Threefish 1024bit and SHACAL-2 512bit for Pro ...
Real Wiper
1.0.0 download... offers a reliable solution. The software employs advanced algorithms to overwrite data multiple times, making it virtually impossible for any recovery software to retrieve the erased files. One of ...
Opal CSV Converter
1.4.0 download... its robust encryption capabilities. It employs advanced encryption algorithms to ensure that your text data remains confidential and protected from unauthorized access. Whether you're looking to secure personal notes, business ...