cryptographic algorithms downloads

Toms Hash Explorer

1.2 download

Toms Hash Explorer is a fast multi-threaded cryptographic hash calculation suite with an innovative Explorer-like user ... free Windows utility allows you to easily calculate cryptographic hash values for single files or entire folders ...

XCA

2.7.0 download

... of XCA is its comprehensive support for various cryptographic standards and algorithms. It seamlessly handles the creation and management of ... functionality. XCA's database-driven approach ensures that all cryptographic keys and certificates are stored securely and can ...

Cryptnos

1.3.3 download

... will help you generate strong, pseudo-random passwords using cryptographic hashes. Cryptnos combines a unique "site token" ... master password and runs this data through a cryptographic hash algorithm to produce a password that is ...

Abacre File Encryptor

1.0 download

... files or folders by using 39 advanced encryption algorithms (CAST, Blowfish, Twofish, Rijndael and others). Files maybe encrypted into either one single file either individually. It's also possible to compress ...

5 award

hashgen

1.0.0 download

... a versatile and efficient tool designed for generating cryptographic hashes. This software stands out in the crowded ... you're a seasoned professional or a newcomer to cryptographic tools, Hashgen's user-friendly design ensures a smooth experience. ...

H4shG3n

0.5.5 download

... ability to handle a wide array of hashing algorithms, making it an indispensable tool for anyone involved ... H4shG3n supports a comprehensive range of hashing algorithms, including popular ones like MD5, SHA-1, SHA-256, and ...

ViewPoint

5.01 download

Everybody has a right to privacy and business secrets. You have a little secret. It is saved as a graphics file (illustration, photo, scanned document, etc.). You do not want anyone ...

5 award

SnugPass

1.0.334 download

... Drive, Dropbox, CloudMe, SkyDrive, Yandex.Disk, etc. Uses strong cryptographic algorithms. Your password data is encrypted with AES encryption ...

CHAOS Messenger

4.0 download

CHAOS Messenger is the utility program that creates active Chaos files for Windows. Active Chaos files are executable programs (EXEs) that contain a Chaos file and the software necessary to decrypt ...

Active CHAOS

5.0 download

Active CHAOS is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt ...

CHAOS Shredder

3.0 download

Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format ...

CHAOS Self Decryptor

3.9 download

CHAOS Self-Decryptor is the utility program that creates self-decrypting chaos files for Windows. Self-decrypting chaos files are executable programs (EXEs) that contain a chaos file and the software necessary to decrypt ...

ABC CHAOS

2.75 download

ABC CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, ...

CHAOS Generator

2.4 download

CHAOS Generator is an application designed to generate passwords of any length and character content. CHAOS Generator will create alphabetic, numeric, alphanumeric or all keyboard characters passwords of user-defined lengths. The ...

HashTools

4.8.2 download

... swiftly computes their hashes using a variety of algorithms, including MD5, SHA-1, SHA-256, SHA-384, SHA-512, and CRC32. ... needs, from simple checksum comparisons to more complex cryptographic requirements. One of HashTools' standout features is ...

VSTextHash

1.0.3.65 download

VSTextHash is a cryptographic hash calculation software. This software lets you hash text with many different hash algorithms. Simply type the text in this calculator and ... be immediately displayed. VSTextHash supports a variety of cryptographic hash functions, including SHA1, SHA-224, SHA-256, SHA-384, SHA-512, ...

EasyHash

1.1 download

... utility designed to simplify the process of generating cryptographic hashes. This software caters to both novice users ... reducing the learning curve significantly. **Robust Hashing Algorithms** EasyHash supports a wide array of hashing algorithms, ...

HashTool

0.7.3 download

... **Key Features:** 1. **Wide Range of Hash Algorithms:** HashTool supports an extensive array of hashing algorithms, including MD5, SHA-1, SHA-256, SHA-384, SHA-512, and more. ... from simple file integrity checks to more complex cryptographic needs. 2. **Intuitive User Interface:** Built with ...

fHash

3.11.3.0 download

... core, fHash supports a wide array of hashing algorithms, including MD5, SHA-1, SHA-256, and more, ensuring compatibility ... does not disappoint. By supporting a range of cryptographic hash functions, it provides robust protection against data ...

Chilkat Python Encryption Library

10.0.0 download

... comprehensive support for a wide array of encryption algorithms. It includes industry-standard protocols such as AES, RSA, and Blowfish, ensuring that developers have access to the most reliable and secure ...

Stunnel

5.74 download

... robust encryption and supports a wide array of cryptographic algorithms, ensuring that it remains resilient against evolving cyber ...

CryptoSharp Security Library

1.3 download

... security components for easy integration into your projects. Cryptographic and compression algorithms, secure hash functions and cryptographically strong random number generators are included in the ... your projects from unsecured data storage to strong cryptographic protection. Wiping out temporary files and confidential documents ...

iSeePassword - iTunes Password Recovery V2.1.3.0

2.1.3.0 download

... advantage of the advances in cryptanalysis to render cryptographic algorithms insecure. Brute force attack on cryptographic algorithm makes it extremely easy and safe to ...

PELock

2.08 download

... of original file, encryption of code (publicly available cryptographic algorithms and algorithms build polymorphic ally) , reorganization of basic PE ... verification of registration keys using public keys encryption algorithms (RSA), ability to create trial keys and hardware ...

CHK File Recovery

5.51 download

... distribution. At its core, CHK employs advanced cryptographic hash functions to generate unique checksums for files. ... The software supports a wide array of hash algorithms, including MD5, SHA-1, SHA-256, and more, catering to ...