Toms Hash Explorer 1.2 freeware

... Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. ...

Author Tom Andreas Mannerud
Released 2016-08-20
Filesize 17.44 MB
Downloads 328
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords CRYPTO, HASH, HASHING, MD5, SHA, SHA-1, SHA-2, SHA256, SHA384, SHA512, SHANNON, ENTROPY, FILE INTEGRITY, FAST, MULTI-THREADED, FREE
Users' rating
(15 rating)
Toms Hash ExplorerEncryption ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Toms Hash Explorer - md5 sha 1 Freeware Download Notice

Toms Hash Explorer Free Download - we do not host any Toms Hash Explorer torrent files or links of Toms Hash Explorer on rapidshare.com, depositfiles.com, megaupload.com etc. All Toms Hash Explorer download links are direct Toms Hash Explorer download from publisher site or their selected mirrors.

Toms Hash Explorer freeware - The Latest User Reviews
Toms Hash Explorer freeware - The Latest Versions History
1.2 Aug 20, 2016 Minor Update File Integrity Verification/Batch Verification
1.1 Apr 29, 2016 New Release Themes/Skin Support, Drag and Drop, and File Entropy Computation using Shannon's Entropy Algorithm.

Most popular Encryption Tools freeware downloads

fHash

3.11.5.0 freeware download

... supports a wide array of hashing algorithms, including MD5, SHA-1, SHA-256, and more, ensuring compatibility with various security and ...

New Version

Hash Codes

1.62.780.7200 freeware download

... This tool supports: Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. ... Uses Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, ...

Cryptnos

1.3.3 freeware download

... variety of cryptographic hash algorithms Supported hashing algorithms: MD5, SHA-1, SHA-256, SHA-384, SHA-512, RIPEMD-160, Whirlpool (2003 revision), and Tiger (1995 original, ...

VSFileHash

1.0.3.121 freeware download

... a variety of cryptographic hash functions, including SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, Tiger-192, Whirlpool, RIPEMD-128, RIPEMD-160, ... Skein512-512, Skein1024-224, Skein1024-256, Skein1024-384, Skein1024-512, Skein1024-1024, MD2, MD4, MD5, Panama, Adler32, CRC32. Some cryptographic hash functions are ...

Hash Codes x64

1.62.780.7200 freeware download

... This tool supports: Adler32, CRC32, CRC64, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, RIPEMD-128, RIPEMD-160, RIPEMD-256, RIPEMD-320 or Whirlpool algorithm. ... Uses Adler32, CRC32, CRC64, GOST, HAVAL, MD2, MD4, MD5, MD6, SHA-0, SHA-1, SHA-1-IME, SHA-224, SHA-256, SHA-384, SHA-512, ...

VSCryptoHash

2.5.3.509 freeware download

... supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2. ...

VSCryptoHash 64-bit

2.5.3.509 freeware download

... supports a variety of cryptographic hash functions, including SHA-1, SHA-256, SHA-384, SHA-512, MD5, MD4 and MD2. ...

SFV Ninja

1.3.6 freeware download

... which can create and compare checksums. It supports MD5, SHA-1 and SHA-256 formats. It has two verification modes. The first ...

Toms Hash Explorer

1.2 freeware download

... Supports the most popular hashing algorithms such as MD5, SHA-1, and SHA-2 including SHA256, SHA384, and SHA512. Key Features include: ...

VSTextHash

1.0.3.65 freeware download

... a variety of cryptographic hash functions, including SHA1, SHA-224, SHA-256, SHA-384, SHA-512, SHA3-224, SHA3-256, SHA3-384, SHA3-512, Tiger-192, Whirlpool, RIPEMD-128, RIPEMD-160, ... Skein512-512, Skein1024-224, Skein1024-256, Skein1024-384, Skein1024-512, Skein1024-1024, MD2, MD4, MD5, Panama, Adler32, CRC32. Some cryptographic hash functions are ...