Home | Submit a file  |  New  |  Categories  |  Our awards  |  Link to us  |  RSS Feeds

Advertising
Display: short descriptions | full descriptions
  • Audit and recovery of MySQL passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • Audit and recovery of Oracle Database passwords. Account information import from databases. Password recovery using dictionary attacks, brute force attacks, hybrid dictionary/brute force attacks, precomputed hashes attacks. Generation of reports on recovered passwords.
  • Uplet is a bulk Instagram uploader for Mac. This awesome app allows you to upload and post any number of photos to your Instagram account in a single click. The interface of Uplet is really simple. All you need to do is login to your Instagram account, drag-and-drop photos you want to upload and post all of them in one go, directly from your Mac. If required, you can edit pictures one-by-one. Uplet allows you to: ? post photos in their original dimensions or crop them square; ? upload multiple photos at a time; ? keep the original quality of images; ? add captions with hashtags and emoticons. Please note that Uplet is not affiliated to Instagram, so you will need your Instagram account to use it. The app is available as standalone software, or via Mac App Store.
  • PeaUtils is a free suite of file management tools, spin-off of PeaZip project meant for providing a minimal, easy to use GUI to access most common file management functions, as compute file checksum (CRC), hash (MD5, SHA1, SHA2, SHA3), hex preview, split and join files, and secure deletion of files and free disk space. The program is also available as portable software not requiring installation. Open Source (LGPLv3), free for any use.
  • PeaZip for Windows 64 bit is a free file archiver utility. Open, convert and extract RAR 7Z ACE APK CAB BZ2 DMG ISO JAR GZ LHA PAQ PEA TAR ZIP ZIPX files, work with 180+ archive formats. Supports advanced file management and archiving features (bookmarks, search, verify crc/hash, find duplicates, file converter, sfx), especially security related: strong encryption, two factor authentication, encrypted password manager, secure data delete.
  • HashTab provides OS extensions to calculate file hashes and supports many hash algorithms such as MD5, SHA1, SHA2, RipeMD, HAVAL and Whirlpool.
  • File Checksum Tool is a free portable application that can generate a MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512 hash from a file. These are common hashes that are used to verify the integrity and authenticity of files. The software allows you to verify the Hash to ensure the file integrity is correct with the matching file or create new checksum for your important data. Many download sites list the MD5 hash along with the download link.
  • The MD5 message-digest algorithm is a widely used cryptography hash function producing a 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptography applications, and is also commonly used to verify data integrity.SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function designed by the United States National Security Agency and is a U.S. Federal
  • Create and print listings of files from selected directories on hard disks, cd-roms, dvd-roms, floppys, usb storages and network shares. Listing can be in HTML, text, CSV or database format. Print standard information like file name, extension, type, owner and attributes as well as EXE, DLL, OCX information like file version, description, company, MP3, DOC, XLS, PPT, AVI, WAV properties like track, title, album, FPS and CRC32, MD5, SHA1 hashes.
  • JavaScript Hashset - is a searchable implementation of the HashSet data-type for JS and Node. This is free, open source software available at http://searchturbine.com/js/javascript-hashset under the BSD License. JS HashSet is alike an unordered array of values - but values can be looked up exponentially faster than in a conventional value array like ['A','B','C'].
  • Free MD5 SHA1 Verifier is a freeware tool designed to calculate and verify checksums (hash) of downloaded files. Supports MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512. Key Features: The program has a convenient user interface. Instantly calculate checksum (hash) for any file. Verify file checksum. Supports most hashing algorithm: MD5, SHA-1, HAVAL, MD2, SHA-256, SHA-384, SHA-512. Drag-and-Drop is supported. The program is very customizable.
  • AES Encryption component provides a simple interface to encrypt/decrypt files, strings or data from Xbase++ applications. Uses the 256-bit AES symmetric encryption algorithm (Rijndael) for strong encryption. Supports CBC and ECB mode, initialization vectors, SHA-256 cryptographic hash algorithm, key generation from text and password phrases. Implements buffer padding and does random byte data generation. Works with 32-bit Xbase++. Win32/Win64.
  • Subhash TweetsToRSS Server is a lightweight web server that sits between your feed reader application and Twitter.com. You can create RSS feed URLs for your favourite Twitter users, hashtags, and search results and then use it in your feed reader. TweetsToRSS is not dependent on any web service other than Twitter. It is totally free and requires no registration at any site other than Twitter. Before using as an RSS server, TweetsToRSS needs to be authorized on Twitter using a valid Twitter account. From then on, Twitter accounts can be tracked without having to actually following those users. To start the software, use the command "java -jar Subhash-TweetsToRss-Server.jar". To remove the software, delete the directory. Do not use the software on unauthorized computers. Delete the Twit.bin file before leaving if you are on a loaned computer.
  • PCMate Free File Encryptor is a security software product that helps lock your important files from prying eyes with secure cryptographic algorithms including cipher & hash. With this free file encryptor, it is easy to password protect your data like documents, movies, photos, and more against unauthorized reading, playing, etc. Meanwhile, it is easy to decrypt files if you want to remove restrictions for anyone to access or share your files.
  • Convert between any video formats: Input Formats: FLV (Flash Video), AVI (DIVX, XVID), MPEG1, MPEG2, MPEG4 (iPod, PSP, MP4), 3GP, 3GP2, MOV, DAT, WMV, ASF. Output Formats: FLV, SWF, AVI, MPEG (DVD, VCD, SVCD, MPEG1, MPEG2), MPEG4 (iPod, PSP), 3GPP, 3GPP2, WMV, RMVB, MOV, MP3, WAV. Cut, Merge a lot of video/audio files into 3GP, FLV, SWF, iPod, PSP, MP4, RMVB, MP3, WAV, WMA, MOV, MPEG1, MPEG2, VCD, SVCD, DVD, AVI or WMV files. Add Overlay Image (Bitmap, GIF, JPEG, PNG) to your video file, user define transparent color, position of image, Alpha channel value. Add 3D transitions (70 transitions) (any combination of video clips). Draw Banner text in video file, support different text style, including outline , filled outline, hash brush text style. Add awesome effects (over 50 effects) (any combination of video clips). Draw multi-line text at a specific time in your video file, user define transparent color, position of text, Alpha channel value. User define thumbnail ...
  • The professional software for recovering passwords to hashes optimized for working with large hash lists. Supports over 170 hashing algorithms. Unlimited loadable hashes, dictionaries, rules, and masks. 64 bits and multithreading.
  • If you lost or forgotten your MS Access Password, don?t be panic, try V2 Softlogic Access database password recovery software which helps in recovering password even database file format is 95, 97 or 2000 based. Access password recovery software is Windows 8 compatible utility, quickly recovers all the characters of MDB file login even they are Unicode multilingual. Instead of using time consuming dictionary attack or brute-force algorithms, it instantly reads & decrypts the password hashes and display password in original. Our advanced design and coding technique supports decryption of all versions of Access database password including 95/97 and 2000. MS access password recovery tool also supports retrieval of password of any length and any language. Program is GUI based and user friendly. Operating the tool of Microsoft access database password unlocking if effortless job; does not require special training. Also program is completely independent and standalone, supports all Windows platforms includi ...
  • Windows Password Recovery Bootdisk works as a life ring when you forget or lose a Windows user account password. In few minutes it erases the password to a specific user account or all of them with a specially created bootable CD/DVd disk or a USB drive. Just boot from it, select the remove password option and reboot to freely login to the system. Alternatively you can restore password hashes to try to recover the original passwords.
  • CryptoBlackbox .NET is the class library that adds support for various cryptography functions to your .NET, Windows Phone or Windows RT application. CryptoBlackbox includes hashing and HMAC, symmetric encryption, asymmetric (PKI-based) encryption and digital signing, timestamping and X.509 certificate management, key derivation functions.
  • CryptoBlackbox for Java is the comprehensive class library that adds support for various cryptography functions to your Java or Android application. CryptoBlackbox includes hashing and HMAC, symmetric encryption, asymmetric (PKI-based) encryption and digital signing, timestamping and X.509 certificate management, key derivation functions.
  • SecureBridge Standatd is a non-visual component library for Delphi and C++ Builder. It can protect any TCP network traffic using SSH or SSL secure transport layer protocols to provide authentication for client. It is a solution for developing applications using such various IDEs as RAD Studio, Delphi and C++Builder on Windows, Mac OS X, and now with support for RAD Studio XE4, NEXTGEN compiler. SecureBridge Standatd key features: * RAD Studio XE4 support * NEXTGEN compiler support * Mac OS X development support * Win64 development support * Support for SSH, SSL, and TLS protocols * Fast and customizable SSL client * Support for most SSH2-compatible clients and servers including OpenSSH * Fast and customizable SSH client * Fast and customizable SFTP client * Does not require external modules * Protection against diverse crypto attacks * Integration with Indy, MyDAC, and PgDAC * Support for SHA1 and MD5 hashing algorithms * Authentication by password or by public key * Compatible with any T ...
  • Easy and advanced encryption, decryption and hash ActiveX component for ASP or AS Support encryption and decryption of file, string, memory buffer Support calculation of hash on string, file or memory buffer Support digital signature creation and validation Support state of art crypto algorithm like RC2, RC4, MD2, MD4, MD5, SHA, SHA256, SHA384, SHA512, DES, 3DES, 3DES2, AES128, AES192, AES256 Import and export key in plain or raw bits
  • P2 Commander is a fully automated digital forensic analysis tool designed to forensically analyze computer data. With a focus on email and network email analysis, internet history analysis, chat log analysis, data triage, deleted data recovery, file sorting and viewing, hash database filtering, email converstion, pornography detection, and much more, P2 Commander allows anyone to perform computer investigations.
  • SHA1 Checker by Ice Nebula calculates an MD5 or SHA1 checksum to validate that a file downloaded from the internet has not been tampered with. SHA1 Checker is fast and calculates hashes in a separate thread to handle large files.
  • Advanced File Calculator is a cryptographic data hash calculation software. Simply drag and drop files in this calculator and hash string for the files will be immideately displayed. Supported cryptographic hash calculation algorithms include CRC32, GOST hash, MD2, MD4, MD5, SHA-1, HA2 (256), SHA2 (384), SHA2 (512). You may copy the hash string for a single file or export the full list of hash strings in a text file.
Advertising

Page 1 of 4
1 2 3 4


Legal disclaimer | Privacy policy

© 2004-2018 IT Shareware