hasha - Hashing made simple. Get the hash of a buffer/string/stream/file.

  •        15

Hashing made simple. Get the hash of a buffer/string/stream/file.Convenience wrapper around the core crypto Hash class with simpler API and better defaults.

https://github.com/sindresorhus/hasha

Tags
Implementation
License
Platform

   




Related Projects

jshashes - Fast and dependency-free cryptographic hashing library for node


jshashes is lightweight library implementing the most extended cryptographic hash function algorithms in pure JavaScript (ES5 compliant).You can use the simple command-line interface to generate hashes.

HashPump - A tool to exploit the hash length extension attack in various hashing algorithms


A tool to exploit the hash length extension attack in various hashing algorithms. Currently supported algorithms: MD5, SHA1, SHA256, SHA512.

EMIHash - Managed hash library


A managed hash library that supports SHA1, SHA256, SHA384, SHA512, MD5, MD2, CRC32_ZIP, CRC8, CRC16_IBM, CRC16_CCITT, CRC16_ARC, CRC16_XMODEM, CRC16_ZMODEM, CRC24, CRC32, CRC32_JAMCRC, CRC32_BZIP2, CRC64_ISO, CRC64_ECMA, MD4, SHA224, HMACSHA1, HMACSHA256, HMACSHA384, HMACSHA51...

ChecksumGUI


ChecksumGUI is a simple Windows application to compute file or text hash. It supports MD5, SHA1, SHA256, SHA384 and SHA512 algorithms. ChecksumGUI is based on .Net Framework 4 and WPF.

Power Hasher


Power Hasher is a program that allow you to get the hash code of multiple files at once, and export the results to a file, making easy for this file to be imported and the files checked. Currently it supports MD5, SHA1, SHA256, SHA384 and SHA512.


KIside


KIside is a message digest computing and displaying tool. It computes and shows the hash code of any file as a string of hexadecimal numbers. KIside implements standard algorithms such as MD4, MD5, SHA1, SHA256, SHA384, SHA512, TIGER, RIPEMD160.

forge - A native implementation of TLS in Javascript and tools to write crypto-based and network-heavy webapps


A native implementation of TLS (and various other cryptographic tools) in JavaScript. The Forge software is a fully native implementation of the TLS protocol in JavaScript, a set of cryptography utilities, and a set of tools for developing Web Apps that utilize many network resources.

Mantas Cryptography


Pequena biblioteca de criptografia com suporte aos algorítmos DES, RC2, Rexor e TripleDES. Gera hashes HMAC-MD5, HMAC-RIPEMD160, HMAC-SHA (SHA1, SHA256, SHA384, SHA512), MD5, RIPEMD160 E SHA (SHA1, SHA 256, SHA384, SHA512)

object-hash - Generate hashes from javascript objects in node and the browser.


Generate hashes from objects and values in node and the browser. Uses node.js crypto module for hashing. Supports SHA1 and many others (depending on the platform) as well as custom streams (e.g. CRC32). Starting with version 1.1.8 (released April 2017), new versions will consider the exact returned hash part of the API contract, i.e. changes that will affect hash values will be considered semver-major. Previous versions may violate that expectation.

imagehash - 🌄 Perceptual image hashing for PHP


A perceptual hash is a fingerprint of a multimedia file derived from various features from its content. Unlike cryptographic hash functions which rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the features are similar. Perceptual hashes are a different concept compared to cryptographic hash functions like MD5 and SHA1. With cryptographic hashes, the hash values are random. The data used to generate the hash acts like a random seed, so the same data will generate the same result, but different data will create different results. Comparing two SHA1 hash values really only tells you two things. If the hashes are different, then the data is different. And if the hashes are the same, then the data is likely the same. In contrast, perceptual hashes can be compared -- giving you a sense of similarity between the two data sets.

DySFV


A file verification application, that compares files to MULTIPLE premade SFV or MD5 files. It supports creating hashes in CRC32, MD5, SHA1, SHA256, SHA384, SHA512 and RIPEMD160. It also has a clone finder that uses the crc32 function.

GtkHash


A GTK+ utility for computing message digests or checksums. Currently supported hash functions include MD5, MD6, SHA1, SHA256, SHA512, RIPEMD, HAVAL, TIGER and WHIRLPOOL.

MD5 computation program


MD5 project is a simple example of using ComputeHash method to create MD5 hash value from a file given in argument. It's written in C#. Also available at http://code.google.com/p/md5-computation-program/

verinfo - File/PE-Image Version Information Application


The "verinfo" application is a command line application that will show you version information (and more!) for either a single file, multiple files or even a complete directory. It has some optional features like MD5/SHA1 generation, HTML Output, Logging Output to a file and/o...

BD File Hash


BD File Hash is a convenient file hashing and hash compare tool for Windows which currently works with MD5, SHA-1, SHA-256, and SHA-512 algorithms.

Okio - A modern I/O API for Java


Okio is a library that complements java.io and java.nio to make it much easier to access, store, and process your data.

Fsum frontend


Fsum Frontend is a files integrity checker. It can calculate 96 hash and checksum algorithms(CRC32, MD5, SHA1, SHA2, ADLER, DHA256, FORK256, ...). You can verify your files using a .sfv/.md5/.sha1/.sha2 file or create your own checksum file.

SSIS Multiple Hash


SSIS Multiple Hash makes it possible to generate many Hash values from each input row. Hash's supported include MD5 and SHA1.

OSX-Arc-White - a flat theme collection based on arc with transparent elements for GTK 3, GTK 2 and Unity, Pantheon, XFCE, Mate, etc


OSX-Arc theme collection is a flat theme collection based on arc with transparent elements OSX-Arc Collection is available in three variants, it also supports GTK 3, GTK 2 and Gnome-Shell which integrates with GTK 3 and GTK 2 based desktop environments like Gnome, Unity, Budgie, Pantheon, XFCE, Mate, etc.Ubuntu & Debian based distributions can now install the newly created Debian packages for easy installation of the theme collection, also all deb files have checksums MD5,SHA1 and SHA256 for file integrity links are below.