QArchive.ORG Main Page
Home | Blog | Terms of service | Sign in
All Vista Win Linux Mac
Sha256 File Hashing Tool Free Downloads




Obtain several hash values for any file. Hash 1.0 Forensic examiners often need to quickly obtain the hash values for potential evidence files for reports or to verify their results. Pinpoint Hash was created to allow users to quickly obtain the hash values for CRC-32, MD5, SHA-1 and SHA-256 hash values for any file and quickly copy the results to the clipboard for easy transport to any other application. It's quick. It's simple. It's free. Enjoy.

its a nice thing

YES T CAN PROVIDE HASHES FREQUENTLY BUT I WANTS TO CRACK HASH WILLING TO CONVERT IT IN PLAIN TEXT

really i want to know how this software is used .

Program works well. Has no problems. I tried it against several file types. Many hash types to choose from.

Very useful program. Glad to find a Windows version of a program I used frequently in UNIX.

comparison Wish there was some way to paste in a key to be checked against the hash generated from the file. I am sometimes prone to error when I compare hashes by eye to verify integrity.ex.File Name: (Browse)Expected hash: | MD5 hash: |





DPASHA check files/strings with many hashes DPASHA 1.99 DPASHA created a single HASH. MD2, MD4, MD5 120bits, RIPEMD128 128bits, RIPEMD160 160bits, CRC32 32bits,CRC16 16bits, ARC-CRC 16bits, SHA1 160bits, SHA-256 256 bits, SHA-384 384 bits, SHA-512 512 bits, HAVAL128 128bits, HAVAL160 160bits, HAVAL192 192bits, HAVAL224 224bits, HAVAL256 256bits, Tiger128 128bits, Tiger160 160bits, Tiger192 192bits and GOST R 34.11-94. Freeware version.You can test files for manipulations.

Hard to understand user interface

DPASHA is great. However, I would like to see some sort of automation or server-side implementation in the future :)

Nice program!It helped me prove which hash was being used in a particular security research issue.I had the password, and the hash, and DPASHA returned a matching hash, thus identifying which hash was being used.Sweet!Kaos Kidd

I needed to verify a file and DPASHA did exactly that. Very intuitive

The hash algorithms seem to perform well. The interface is clear enough but fairly ugly. A useful addition would be a status bar or progress meter - for large files that take time to process the application window freezes with some display issues (missing buttons etc) and it is hard to tell that it is running even though it is. Overall this did the job for me - as freeware it's good value but I don't know if I'd pay for it in its current form.

My review. I'm not understanding how this works. Does the program decrypt hash into text format or just make a comparison to the hash key it'self? I'm looking for a hash decrypter to convert from md2 md4 md5 sha1 256 512 and so forth. I'm still learning to use the various hashes for encrypting files and other types of media and so on. Thank you for the program.





Encryption, hashing, file shredding utility. EDCrypt 3.1 Softuarium EDCrypt is an ActiveX control performing following functions: - encrypts and decrypts text and files using symmetrical ciphers: BLOWFISH, CAST128, GOST, RC2, RIJNDAEL, TWOFISH - computes hashes (message digests) of text and files using hashing algorithms: ADLER32, CRC32, CRC32B, GOST, HAVAL128, HAVAL160, HAVAL192, HAVAL224, HAVAL256, MD2, MD4, MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files


Audio & Multimedia
Business
Communications
Desktop
Development
Education
Games & Entertainment
Graphic Apps
Home & Hobby
Network & Internet
Security & Privacy
Servers
System Utilities
Web Development

Search