Featured 

File Hash

Software
AIDA64 Extreme
rating
86,242
FinalWire Ltd.
AIDA64 Extreme has one of the best hardware detection engines that can provide provides...
AIDA64 Extreme has one of the best hardware detection engines that can provide provides
VeraCrypt
free rating
11,622
IDRIX
VeraCrypt is intended to protect sensitive data by creating encrypted volumes. The tool allows storing...
tool allows storing files in an encrypted container...also supports various hash algorithms
Xceed Components
rating
404
Xceed Software Inc.
Provides a full set of full-featured data manipulation components for less than the price...
simultaneously multi-location file...public key cryptography, hashing, self-extracting
AudioExpert
rating
364
Ulrich Decker Software Entwicklung
The Web holds a plethora of audio-related tools and apps. Some will help you clean your music collection of duplicates...
with 100,000 MP3 files in a couple...use the MD5 hash sum, the file tags
MobileCheck
rating
92
C-DAC Thiruvananthapuram
MobileCheck is a total forensic solution for mobile phones and smartphones. Main features: - Supports more than 1500...
data - Extracts phone file system. Supports MD5 hashing - Generates acquisition
Video Codecs
free rating
72
March Networks Corporation.
March Networks codecs and players enable third-party organizations, such as police and the judiciary...
media clips contain a secure hash (SHA-1) to detect...and may render the file unsuitable for court
MD5 Checker
free rating
62
George Jopling
Like our fingerprints are unique to us and can be used to identify us, computer files can also be examined to produce...
identify us, computer files can...numbers is called a hash (also termed Message Digest
Password Generator 2013 Professional
rating
60
BinaryMark
Password Generator 2013 Professional is capable of generating unlimited passwords according...
of the help file ...includes database export/import, hash generation, e-mail notifications
OSIRT
free rating
52
osirtbrowser.com
Attach any file to your OSIRT case by clicking the Attachment button. It's automatically placed within your audit log...
automatically timestamped, hashed and logged in your case file. Once
Dew Drive
free rating
12
Dew Drive
Dew Drive is a free-to-use online back solution for Windows OS...
simultaneously work on a single file, giving double productivity...using advanced hash
JRecoverer for Oracle Database Passwords
rating
9
LCPSoft
Audit and recovery of Oracle Database passwords. Account information import...
import from a text file. Password recovery using...force attacks, precomputed hashes attacks (using
Stellar Email Forensic
rating
7
Stellar Information Technology Pvt Ltd
Stellar Email Forensic is an investigation tool that offers advanced email search features for 25+ email file formats including...
based mailboxes and backup files, and offers advanced...SHA256, and MD5 hash values of scanned
JRecoverer for MySQL Passwords
rating
6
LCPSoft
Audit and recovery of MySQL passwords. Account information import. Password recovery using dictionary attacks...
import from a text file. Password recovery using...force attacks, precomputed hashes attacks (using
IIS Mod-Rewrite
rating
5
Micronovae Ltd
IIS Mod-Rewrite installs like breeze on your server and you can configure its numerous features through an easy...
support team. Textmap file to hash database (RewriteMap txt
ElcroEncrypter
free rating
4
Elcro
Elcro Encrypter is a FREEWARE application for powerfull data encryption. It uses an advanced 3DES...
base64 encoding and MD5 hash algorithms. It's...archive can contain multiple files and you can
SX MD5 Hash Generator
free rating
4
SecurityXploded
Free MD5...
generate MD5 hash for downloaded file...checksum * Compute MD5 hash for File or Text *
SX SHA1 Hash Calculator
free rating
4
SecurityXploded
Free SHA1 Hash Generator...
generate SHA1 hash for downloaded file...checksum * Compute SHA1 hash for File or Text *
File Hash Shell
free rating
1
McKechney
File hashes are used to verify the authenticity and integrity of files...
File hashes...I easily verify that hash against the file that I actually
P2P Marshal
rating
1
Cyber Security Technologie
P2P Marshal automatically detects a roster of the most commonly-used P2P client programs...
reveals shared files, downloaded files, peer...a detailed log, hashed to insure forensic
Batch RegEx
rating
1
BinaryMark
Replace, format, and extract text in multiple files using Regular Expressions. Perform GREP...
remove duplicates; compute hash; encrypt/decrypt ...operations on different files with conditional