Showing 5 open source projects for "sha1 decrypt"

View related business solutions
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    More flexibility. More control.

    Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1

    Shaget

    An application for getting SHA and MD5 checksums from an file.

    Shaget is an application made in C# for getting SHA (SHA1, SHA256 and SHA512) and MD5 sums from an file. You can verify if the sums are correct and save the full log to an text file. This application does not encrypt or decrypt files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Word Cipher - Encryption/Decryption tool

    Word Cipher - Encryption/Decryption tool

    Encryption/Decryption tool for words/hash/digits/encoded text

    Word Cipher - KRIEG Technologies Developed by: Northumber, KRIEG Technologies This application is developed for encode/decode words and translate them into commons encryption languages but also ancient ciphering language.You can encrypt/decrypt words or text or digits into: ----- Text Ciphering ----- Albam Latin (Temurah) Atbash Latin (Temurah) Avgad Latin (Temurah) Caesar Cipher Flipped Text ----- Text Rotation ----- ROT5 (Digits) ROT13 (Text) ROT18 (Text & Digits) ROT47 ----- Text to Number ----- Binary Hexadecimal ----- Text Encoding ----- Base 64 HTML Entities ----- Text Hashing ----- AES MD5 SHA1 (160 bit) SHA256 SHA384 SHA512 Word Cipher is a free-distributed software.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Khoorio

    Khoorio

    FTP client to encrypt/decrypt and upload/download files

    Khoorio is a FTP client that allows you to safely encrypt your files with the AES Rijndael cipher before uploading them to a FTP server. The key used to encrypt the files is derived by a key derivation function (HMAC-SHA1) as follows: encryptionKey = HMAC-SHA1(hash_plaintext_file,user chosen master password). With this key the user allows someone to decrypt a specific file, without the need to share his master password to that person. As it consists of a personalized key, the receiving party will only be allowed to decrypt those specific files for which he has received the key, unless he possesses the master password that was used to encrypt the files. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    CryptX Project v3.56

    A Quick Encryption Program!

    CryptX Is An All In One Text Encoder, Hash Calculator And Checksum Checker! It Combines Ease Of Use With Extraordinary Features! Some Of It's Features Include: Interactive Interface Hashing Function: {HASH ONLY} SHA1 SHA256 SHA384 SHA512 MD5 RIPEMD160 Key Generation: MACTripleDES Key Generation MD4 Hashes: Base64: {Encrypt/Decrypt} With/Without Password Encoding: Binary {Encrypt/Decrypt} Checksum Hashes: SHA1 SHA256 SHA384 SHA512 MD5 RIPEMD160 Checksum Auto-Save Read An Encrypted Text File To Decrypt It Read A Plain Text File To Encrypt It Save The Encrypted/Decrypted Text And Of Course Its All Free! ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Safetica Data Loss Prevention Software for Businesses Icon
    Safetica Data Loss Prevention Software for Businesses

    For companies that want to protect their sensitive data against leakages, insider threats and want to be compliant with regulations.

    Safetica is a cost-effective, easy-to-use Data Loss Prevention (DLP) solution. It performs security audits, prevents sensitive data from leaving your company, and sheds light on what is going on in your organization.
    Learn More
  • 5
    Cryptographically secure your files with asymmetric and symmetric keys, as well as password based encryptions and file/text checksums. Use upto 6 different keys to encrypt/decrypt and get checksums using MD2, MD5, SHA1, CRC32, etc..
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB