Software Listing: Sha1 Hash
- MD5 and SHA1 File Verification
- License: Shareware

MD5 and SHA1 File Verification is a lightweight and easy to use application that allows you to check the integrity of any file.
The usage is simple: just choose the file you want to verify and press the 'Compute' button to obtain the MD5 and SHA1 hash codes.
.
- Publisher: Ice Nebula
- Date:
- Platform: Win2000, Windows 7, WinOther, WinServer
- enviroHash
- License: Freeware
- Price: 0.00

enviroHash was developed as an accessible and handy network hash utility. enviroHash was created as an accessible and useful tool that can also catalog a running file system.
You can access this user-friendly software to perform and MD5 or SHA1 hash.
.
- Publisher: Christopher Schek, Ben Martino
- Date:
- Platform: WinOther
- SHA1 Collision Detection
- License: Freeware
- Price: 0.00

This application will find any text values that match a given SHA1 hash. You can use the included "SHA1 Hash Gen.html" (which is dlTe 2005 Chris Veness) to create SHA1 hashes for testing purposes..
- Publisher: networkdls.com
- Date:
- Size: 51 KB
- Platform: WinOther
- Gnasher
- License: Freeware
- Price: 0.00

Gnasher alleviates developers from having to execute maven builds with the "-o" option (offline) to avoid accessing external repositories metadata files. SHA1 hash files and the missing pom metadata files for dependencies are created if missing..
- Publisher: gnasher.sourceforge.net
- Date: 06-07-2012
- Size: 151 KB
- Platform: Linux, Mac OS X, Unix, WinOther
- FlyingBit Hash Calculator
- License: Freeware
- Price: 0.00

FlyingBit Hash Calculator is an add-in for the OS shell allowing you to find out the hash sum of any file right from the context menu of the system. Now you do not have to run a special program, select the Open menu item and then search for the necessary file. You can find out the hash sum right in Explorer! Moreover, the program can compare MD5 sums with *.md5 files of the GNU MD5Sum tool and also create its own *.md5 files. FlyingBit Hash Calculator calculates the hash sum using about 9 different algorithms among which there are such popular algorithms as MD5, CRC32 or SHA1 and less popular ones, for example, TIGER.
- Publisher: FlyingBit Software
- Date: 19-03-2008
- Size: 288 KB
- Platform: Win2000, Windows Server, Windows Vista, WinOther
- SB-SHA1 Calculator
- License: Freeware
- Price: 0.00

SB-SHA1 Checksum Calculator is a tool to calculate and compare the SHA1 checksum of files. The SHA1 is a 160-bit hash function which resembles the earlier MD5 algorithm. This was designed by the National Security Agency (NSA) to be part of the Digital Signature Algorithm. Features Calculate SHA1 checksum of a file. Compare SHA1 checksum of two files. Copy SHA1 hash to Windows clipboard. Compare value from the clipboard with SHA1 checksum of a file. It is free..
- Publisher: CzechMex LLC
- Date: 20-02-2013
- Size: 1673 KB
- Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64
- FairStars HashFiles
- License: Freeware
- Price: 0.00

FairStars HashFiles is a free utility that allows you to calculate the MD5, CRC32, SHA1 and SHA256 hash value of one or more files. You can easily copy the MD5/SHA1 hash list into the clipboard, or save them into text file. Features . Calculate the MD5, CRC32, SHA1 and SHA256 hash value of one or more files. . Support Drag and Drop: supports dragging and dropping files or folders from the File Explorer into the window of the converter. . Easy-to-use user-friendly interface..
- Publisher: FairStars Soft
- Date: 06-09-2014
- Size: 131 KB
- Platform: Win2000, Win7 x32, Win7 x64, Windows Server, WinOther, WinVista, WinVista x64
- CyoHash
- License: Freeware
- Price: 0.00

CyoHash is an extension that is used to calculate the MD5 and SHA1 hashes of a file, which are displayed in a mixture of encodings.
CyoHash is useful for ensuring that a file has been downloaded correctly or, for security purposes, to ensure the integrity and validity of a file. Easy to use: simply right-click a file in Windows Explorer and click CyoHash!
.
- Publisher: Cyotec Systems
- Date:
- Platform: Windows 7, WinOther, WinServer, WinVista
- MSCCrypto for Linux
- License: Shareware
- Price: 161

MSCCrypto is COM component for Active Server Pages and stand-alone applications. It includes collection of the best encryption and hashing algorithms: - RSA public key algorithm (512/1024/2048 bits key size) - AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash) - Ripemd hash (160 bits hash) - 32-bit CRC checksum algorithm - 24-bit CRC checksum algorithm Additionally, MSCCrypto 2.
- Publisher: Miraplacid
- Date: 03-03-2005
- Size: 225 KB
- Platform: Linux
- MSCCrypto for Windows
- License: Shareware
- Price: 129.00

MSCCrypto is COM component for Active Server Pages and stand-alone applications. It includes collection of the best encryption and hashing algorithms: - RSA public key algorithm (512/1024/2048 bits key size) - AES symmetric block algorithm (128/192/256 bits key size) - Blowfish symmetric block algorithm (64 to 448 bits key size) - Cast5 (Cast 128) symmetric block algorithm (128 bits key size) - TripleDES symmetric block algorithm (192 bits key size) - Twofish symmetric block algorithm (128/192/256 bits key size) - MD5 hash (128 bits hash) - SHA1 hash (160 bits hash) - Ripemd hash (160 bits hash) - 32-bit CRC checksum algorithm - 24-bit CRC checksum algorithm Additionally, MSCCrypto 2.
- Publisher: Miraplacid
- Date: 10-01-2008
- Size: 956 KB
- Platform: Win2000, Windows Server, Windows Vista, WinOther
- J4L PDF digital signature
- License: Shareware
- Price: 43.00

Java component that creates/adds a digital signature to a PDF file. It is very easy to use, just 2 lines of Java code are required. It can be used in comercial products. This signature ensures the integrity of your document and its authentication. In other words, the receiver of the document knows you have created that document (authentication) and noone has modified it (integrity). The signature created will use the algorithms RSA signature, SHA1 hash and PKCS7 encoding. It works on Java 1.5 or later. PDF digital signature for the Java[TM] Platform. PDF signature for the Java [TM] platform.
- Publisher: J4L Components
- Date: 08-04-2011
- Size: 6378 KB
- Platform: Linux, Win2000, WinOther
- MSCCrypto
- License: Shareware
- Price: $129.00

A collection of the best encryption and hashing algorithms MSCCrypto is COM component for Active Server Pages and stand-alone applications. It includes collection of the best encryption and hashing algorithms: RSA public key algorithm (512/1024/2048 bits key size)AES symmetric block algorithm (128/192/256 bits key size)Blowfish symmetric block algorithm (64 to 448 bits key size)Cast5 (Cast 128) symmetric block algorithm (128 bits key size)TripleDES symmetric block algorithm (192 bits key size)Twofish symmetric block algorithm (128/192/256 bits key size)MD5 hash (128 bits hash)SHA1 hash (160 bits hash)Ripemd hash (160 bits hash)32-bit CRC checksum algorithm24-bit CRC checksum algorithm Additionally, MSCCrypto includes PGP/OpenPGP - compatible component, MSCCyrptoPGP.
- Publisher: miraplacid.com
- Date: 14-07-2009
- Size: 956 KB
- Platform: WinOther
- Encodiator
- License: Freeware
- Price: 0.00

Encodiator supports you converting any binary file into it's hexadecimal byte-by-byte equivalent (hex dump) or into Base64 format and helps you later reconverting this hex notation backwards to the original file. So you can simply generate printable versions or send copies of files via e-mail and later rebuild the original binary file from it. Currently Encodiator supports encoding and decoding of Hex Dumps and of Base64 and generating File Hashs. For future versions additional conversion features are planned..
- Publisher: Engineer.iX Software Services
- Date: 06-05-2011
- Size: 54 KB
- Platform: Win2000, Win7 x32, Win7 x64, WinOther, WinVista
- NPE File Analyzer
- License: Freeware
- Price: 0.00

NPE File Analyzer is a utility that allow users to view and edit 32bit and 64bit Portable Executable (PE) files, such as .EXE .DLL and .SYS files. NPE provides functions for inspection of unknown binaries, you can analyze sections, resources, import and export tables, relocations, TlsTable, and much more. It has a built-in process manager to analyze running processes and loaded modules. It is possible to fix a dumped file, realign file, extract PE(s) from a file, add code cave and compare PE files to check for differences in the PE structure. NPE can also generate MD5 hash, SHA1 hash and CRC32 hash of a file.
- Publisher: NoVirusThanks.org Software
- Date: 24-07-2012
- Size: 8305 KB
- Platform: WinOther
- SIM Card Seizure
- License: Shareware
- Price: 129.00

Recover deleted sms/text messages and perform comprehensive analysis of SIM card data. SIM Card Seizure takes the SIM Card acquisition and analysis components from Paraben's Device Seizure and puts it into a specialized SIM Card forensic acquisition and analysis tool. SIM Card Seizure includes the software as well as a Forensic SIM Card Reader. If you already have Device Seizure & the Device Seizure Toolbox, there's no need for you to get SIM Card Seizure as well because they contain the components to perform a forensic SIM Card acquisition and analysis. This tool is for the investigator who only wants to acquire SIM Cards and does not want to perform forensic exams of all cell phone data.
- Publisher: Paraben Corporation
- Date: 09-10-2012
- Size: 53115 KB
- Platform: WinOther
- OSFClone
- License: Freeware
- Price: 0.00

OSFClone is a free, self-booting solution which enables you to create or clone exact raw disk images quickly and independent of the installed operating system. After creating or cloning a disk image, you can mount the image with PassMark OSFMount before conducting analysis with PassMark OSForensics. OSFClone creates a forensic image of a disk, preserving any unused sectors, slack space, file fragmentation and undeleted file records from the original hard disk. Boot into OSFClone and create disk clones of FAT, NTFS and USB-connected drives! OSFClone can be booted from CD/DVD drives, or from USB flash drives.
- Publisher: PassMark Software
- Date: 20-08-2012
- Size: 26604 KB
- Platform: WinOther
- Get Git Info
- License: Shareware

Git is a powerful versioning tool that is compatible with Matlab. Sometimes it is useful to annotate data or figures with information about the current git repository. This script gets the current git repository branch name and SHA1 hash. It also gets URL of the repositories corresponding remote repository. Importantly, this script extracts all of the information from the .git/ folder directly, and thus this script does not make any calls to the program git itself..
- Publisher: Andrew
- Date: 03-05-2013
- Size: 10 KB
- Platform: Matlab, Scripts
- PalCrypt
- License: Shareware

PalCrypt is a file encrypting/decrypting program for Windows operating systems. It use the IDEA (128 bit) encryption algorithm, which is stronger than both DES & 3DES, to encrypt files. MD5 & SHA1 hash is also used to achieve stronger encryption.
You can use PalCrypt from the program window or just by right-clicking the file to encrypt. Double click for decryption. However, keep in mind that you have to run the installer with administrator rights if you want to install PalCrypt under Vista.
.
- Publisher: Pal Microsystems
- Date:
- Platform: Win7 x64, Windows 7, WinOther, WinVista, WinVista x64
- shacrypt
- License: Shareware

SHACrypt is a small console application that allows you to encrypt your files securely using the SHA1 hash function as a cipher..
- Publisher: llamaslayers.net
- Date:
- Size: 10 KB
- Platform: Win2000, WinOther
- SQLCipher for Windows
- License: Shareware

Encrypt or decrypt SQL data (cell-level encryption)
Purpose Encrypt or decrypt string data easily (cell-level encryption) by using SQL Server extended stored procedure.
Target Database SQL Server 7.0, SQL 2000, SQL 2005, SQL 2008/R2
features:
Encrypt or Decrypt string data with AES
Hash encrypt string data with SHA1
Hash encrypt string data with MD5
Flexible key specification in xp_AES_Encrypt, xp_AES_Decrypt, xp_AES_EncryptFile
Conversion utility from string to hex string
.
- Publisher: SQLMgmt.com
- Date:
- Size: 112 KB
- Platform: Win2000, Win7 x64, Windows 7, Windows 8, WinOther, WinServer, WinVista, WinVista x64













