Featured 

Hash Algorithm

Software
FastComputer
rating
224
Alice Dev Team
FastComputer is here to protect your computer from apps that eat up your computer’s...
computer acceleration algorithm, gorgeous...Powerful computer acceleration algorithm. Displaying
HashTab
rating
202
Implbits Software LLC
Hashtab, is the most popular utility for validating file checksums on Windows...
HashTab supports many hash algorithms such as MD5..."File Hashes" menu right there. Hash
FastHash
rating
31
com.FastHash
FastHash is a free software to Fast calculate the file hash for you! You can get md5...
Fast calculate the file hash for you! You can
macKrack
rating
26
com.braden
MacKrack is a password hash brute forcer, supporting the Crypt, MD5 SHA-1, and Salted SHA...
MacKrack is a password hash brute forcer, supporting...and Salted SHA-1 algorithms
Dubitare
rating
17
Johan Andersson
Dubitare is a simple, leightweight, and effective hash identity creation and verifying...
a simple, leightweight, and effective hash identity creation and verifying
HashIt
rating
9
the-nerd
Hashit is a Mac OS X application for developers that can generate your hashes while you are typing. HashIt supports MD5, SHA...
that can generate your hashes...SHA-1 and SHA-256 hashing algorithms with more to come
StereoMonoizer
rating
8
Soundizers
StereoMonoizer is a custom-built algorithm that analyzes...
StereoMonoizer is a custom-built algorithm that analyzes
Vertcoin-Qt
free rating
7
Vertcoin 2014
Vertcoin is a lite version of Bitcoin using scrypt-adaptive-N as a proof-of-work algorithm. Main features: - 2...
N as a proof-of-work algorithm. Main features: - 2.5...with Kimotos Gravity Well algorithm
File Secure
rating
5
By iCaveat
Safeguard your files using 256bit Advanced Encryption Algorithm, the same cipher adopted...
using 256bit Advanced Encryption Algorithm, the same cipher adopted
CryptoDock
free rating
4
Dorde Jocic
CryptoDock is a free multi-platform application written in Java that hosts various hash and modern cryptographic...
that hosts various hash and modern cryptographic algorithms you can
MD5shot
rating
4
Softyards Software
Find the MD5 hash of a string or file without a trip to the Terminal...
Find the MD5 hash of a string...which compares a known MD5 hash of a file
spatium.flocking
free rating
4
ruipenha
This interface uses a 3D flocking algorithm to move up to 16 birds in a 3D space...
interface uses a 3D flocking algorithm to move up
EdgeSounds RatHole
free rating
4
Edge Sounds
EdgeSounds’ RatHole is a free unique universal archiving utility. It was especially designed...
EdgeSounds™ compression algorithm makes it possible...The compression algorithm compresses
KeywordBlueprint2
free rating
2
blueprintcentral
Keyword Blueprint 2 uses a new algorithm that actually scans how well the top sites are seo'd...
Keyword Blueprint 2 uses a new algorithm that actually scans
ResizeMagic
free rating
2
FSoft s.r.l.
This application re-sizes images with a high quality algorithm, similar to the Lanczos algorithm used by other programs...
with a high quality algorithm, similar to the Lanczos...algorithm
SHA-1 Finder
rating
1
Petur Ingi Egilsson
SHA-1 Finder allows you to calculate the SHA-1 checksum (also known as the SHA...
known as the SHA-1 hash)
ADD Demo-1
rating
1
7822383 Canada Ltd.
Do you use Aperture on your mac for your photos and images? Do you have duplicate...
Filename Duplicate •Hash Duplicate •Hash Original •Hash [x] Set:[]...keywords for Hash Duplicate
Cryptographic Anomaly
free rating
1
Cryptographic Anomaly Developers
Cryptographic Anomaly is a crypto-coin that uses a unique block reward algorithm...
unique block reward algorithm. The block...current difficulty. The algorithm
Digital GEM Professional Plug-in
rating Applied Science Fiction
DIGITAL GEM Professional Plug-In adds new features and functionality to the award-winning DIGITAL GEM Plug...
unique and powerful algorithms: Noise suppression...suppression. Each algorithm is customized
PrimTrack
rating Thirteenth Shore Productions
PrimTrack is a short application (short = binge coding in 12 hours or less) that was developed...
demonstrate Prim's algorithm. Prim's algorithm ...graph. The algorithm is actually

Tags