hash downloads
File Joiner - 64bit Portable
2.4.1 download... all files to first file -MD5 and CRC32 hash calculation for output file -loading files from folder and recursive loading from sub-folders -option to associate extension .001 in windows explorer, ...
Password Decryptor for Cisco
6.0 download... Password: These passwords are stored as salted MD5 hash. Requires brute-force attack to recover password Cisco Type 7 Password: These passwords are encoded using Cisco's private encryption algorithm & can ...
mod_authnz_ibmdb2
2.2.6 download... UDFs and Stored Procedures to generate and validate hashes in DB2. They are compatible to the functions ... user authentication: bcrypt (APR-util 1.5.0) md5 normal md5 hash (32 chars as in php) seeded md5 value ...
Crypto Miner
0.4.292 download... coins supported to mine on CPU or GPU. Hash rate and results count is reported in simple UI, detailed progress can be seen in console. To use Crypto Miner you ...
Koinonein Torrent Editor
1.0.0.3 download... of a string identifier you are entering the hash of the the other torrent or torrents that share files with the one you are creating. DHT nodes allows you to ...
Cisco Password Decryptor
6.0 download... Password: These passwords are stored as salted MD5 hash. Requires brute-force attack to recover password Cisco Type 7 Password: These passwords are encoded using Cisco's private encryption algorithm & can ...
Garena Password Decryptor
3.0 download... Right click context menu to quickly copy the hash password * Support for local Installation and uninstallation of the software Garena Password Decryptor works on most of the Windows platforms ...
eMule MET Viewer
1.2.0.0 download... Title Length (sec) Bitrate Codec File Type File Hash ...
Remove Duplicate Lines
1.3 download... e.t.c. Remove Duplicate Lines uses a quick multi-threaed hash sort algorithm to make the process faster. It is easy to use and supports drag and drop. The application is multilingual ...
VeryUtils PDF Digital Signature Tool
2.7 download... and/or OCSP. * Setting certification level. * Setting hash algorithm. * PDF encryption and setting rights. * SHA 256/512 support. * Time Stamping. Signing a PDF document using a digital ...
Steel RunAs
2.1 download... cannot be run. No client side setups,Windows compatibility,MD5 Hash Check ...
PFrank
2.33 download... Powerpoint, etc.), inserting information from text files, inserting hash codes, Powerful Regular Expression (regex) based search/replace engine for defining custom replace commands. Regular expressions are a standard language. With PFrank ...
DupInOut Duplicate Finder
1.1.3.2 download... files by their name, size, path, creation date, hash, etc). Finally, you can delete the duplicates permanently, move them to another folder, or add prefix/ suffix and rename the files. ...
Ethereum Tool
1.1 download... gas price. You can also see your transaction hash on bottom of section. You can see all your transactions of your current wallet with transaction IDs and transaction amount on ...
WooProductManager
1.0.1.5.1 download... (Compatible attribute) Tags can be connected with the hash column (width+height+inch) Very efficient usage of repeating images. Downloadable XML orders with FTP Forward. Dynamic unique text generator (Text Machine) Import ...
FileCentipede
2.82 download... will not be listed.) FTP, FTPS protocol Magnet, HASH address BitTorrent Other custom protocol like thunder, flashget, qqdl JSON formatted address m3u8 stream task Stream task AES-128 decryption (SAMPLE-AES decryption ...
iAntiSpy
1.7 download... request itself is transformed using a one-way cryptographic hash function before processing. The only place the actual requested domain is stored is temporarily in memory, and only for the purpose ...
Speedcrypt
1.0 download... most sophisticated password derivation techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of cryptography! Speedcrypt is ...
010 Editor
15.0 download... The software includes features such as checksums and hash algorithms, which can be used to verify the integrity of files. Additionally, the editor's customizable interface allows users to tailor the ...