hashmyfiles : Finds md5 and Calculate MD5/SHA1/CRC32 hashes of any file
☆17Oct 3, 2015Updated 10 years ago
Alternatives and similar repositories for hashmyfiles
Users that are interested in hashmyfiles are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- BSim signatures and databases for Ghidra to recover function symbols with☆15Jul 11, 2024Updated last year
- VB Exe Parser is an IDA script written in Python. This script will help you to parse VB program internal structures. It can find: Event, …☆17Oct 8, 2016Updated 9 years ago
- One-for-all python script for running LLVM experiment☆11Jun 30, 2022Updated 3 years ago
- Ransomware Dataset for arXiv:1609.03020☆30Dec 29, 2021Updated 4 years ago
- Integration of Sandblocks with Tree-Sitter to load block-based languages from grammars☆14Oct 9, 2025Updated 7 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The PERPL Compiler☆15Oct 17, 2025Updated 6 months ago
- Patch ELF to unshc —— decrypt and extract script from shc(Shell script compiler)☆18Sep 17, 2025Updated 7 months ago
- ☆26Jun 10, 2025Updated 10 months ago
- YAPB: Yet Another Parser Builder (A Programmable LALR(1) Parser Builder in Haskell)☆42Jun 3, 2025Updated 11 months ago
- Exercises for EOPL in Haskell☆15Mar 9, 2026Updated 2 months ago
- UU AFP Summer School Homepage☆11May 20, 2025Updated 11 months ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- Combinator Library for writing test generators and test properties for Android Apps☆12Jul 26, 2019Updated 6 years ago
- Are WiFi Passwords we use these day's actually safe?☆10Mar 7, 2017Updated 9 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- A Multi-Threaded PE Export Collection Utility☆14May 13, 2023Updated 2 years ago
- Signed list of OpenPGP fingerprints for First Look employees☆15Feb 3, 2025Updated last year
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 8 years ago
- PwnWiki - The notes section of the pentesters mind.☆11Nov 16, 2016Updated 9 years ago
- Vision Transformer-Inspired Automated Vulnerability Repair☆19May 13, 2025Updated 11 months ago
- Tools for macOS Forensic Bootable media☆16May 20, 2020Updated 5 years ago
- Python 3 library to build YARA rules.☆13Oct 24, 2021Updated 4 years ago
- Implementation of A New Burrows Wheeler Transform Markov Distance☆12Apr 19, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Training and testing pipeline for ransomware classification based on screenshots of the splash screens or ransom notes (https://arxiv.org…☆11Jul 19, 2020Updated 5 years ago
- Practical String Searching☆12Dec 20, 2019Updated 6 years ago
- ☆10May 11, 2023Updated 2 years ago
- ☆14Sep 15, 2016Updated 9 years ago
- ☆13Aug 31, 2024Updated last year
- ☆12Apr 14, 2017Updated 9 years ago
- A python powered normalized compression distance (NCD) calculator.☆14Jan 26, 2016Updated 10 years ago
- ☆10Jun 16, 2022Updated 3 years ago
- [ICLR 2025 SCI-FM Workshop] Lemur: Log Parsing with Entropy Sampling and Chain-of-Thought Merging☆14Mar 27, 2025Updated last year
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ☆11Dec 30, 2020Updated 5 years ago
- ☆16Dec 21, 2023Updated 2 years ago
- PGPCrack-NG is a program designed to brute-force symmetrically encrypted PGP files. It is a replacment for the long dead PGPCrack.☆24Oct 30, 2017Updated 8 years ago
- AES文件加密解密☆10Apr 26, 2023Updated 3 years ago
- 使用卷积神经网络识别恶意软件,其特点是把文件的每个字节都当做输入☆16Oct 14, 2024Updated last year
- FEM micromagnetic simulator☆11Updated this week
- ☆20Oct 22, 2024Updated last year