For software developers:
(more than 40 languages).
System requirements: Windows 98 / 98SE / ME / 2000 / XP / 2003 / Vista / 7 / 8 /
Mono (Linux, Mac OS X, ...).|
Today you need to remember many passwords. You need a password for the Windows network logon, your e-mail account,
your website's FTP password, online passwords (like
website member account), etc. etc. etc. The list is endless. Also, you should use different passwords for
each account. Because if you use only one password everywhere and someone gets this password you have
a problem... A serious problem. The thief would have access to your e-mail account, website,
KeePass is a free open source password manager, which helps you to manage your passwords in a secure way.
You can put all your passwords in one database, which is
locked with one master key or a key file. So you only have to remember one single master password or
select the key file to unlock the whole database. The databases are
encrypted using the best and most secure
encryption algorithms currently known (AES and Twofish). For more information, see the
Some of the key features of KeePass:
| || |
- Highly encrypted databases.
- Support of master passwords and key files.
- Runs on all Windows operating systems and Mono (Linux, Mac OS X), and doesn't
need to be installed.
- Export password list to various formats (TXT, HTML, XML, CSV, ...).
- Import from many formats.
- Easy database transfer.
- Support of password groups.
- Time fields support.
- Auto-Type, global auto-type hot key and drag-n-drop support.
- Copy fields to the Windows clipboard.
- Searching and sorting.
- Multi-language support.
- Strong random password generator.
- Low memory requirement.
- Open source!
System requirements: .NET Framework 2.0 or Mono ≥ 2.6.|
With VisualHash you can compute hashsums of files and texts. VisualHash supports most
of the common hashing and one-way algorithms, including Adler-32, Cksum-32, CRC-16,
CRC-16-CCITT, CRC-16-XModem, CRC-32, CRC-32-MPEG2, CRC-64, ELF-32, FCS-16,
FNV-32, FNV-64, GOST, MD2, MD4, MD5, PJW-32, SDBM-32, SHA-1, SHA-256, SHA-384,
SHA-512, Sum-32, XUM-32 and many more. VisualHash is distributed under the terms of the GNU GPL.
This program requires .NET Framework 2.0 or Mono. You can get the .NET Framework for free here:
Application, v1.2 (ZIP, 71 KB)
Source code, v1.2 (ZIP, 122 KB)
Old Windows-only application (ZIP, 140 KB, does not require the .NET framework)
Old Windows-only source code (ZIP, 246 KB)
Language: neutral. System requirements: Windows 98 / 98SE / ME / 2000 / XP /
2003 / Vista / 7 / 8 / Unix/Linux (GCC).|
ReHash is an easy-to-use console-based hash calculation tool written in standard C++.
It may be freely distributed and modified under the terms of the BSD open source license.
The tool is compilable under Windows and Linux.
It supports many algorithms, for example Adler32, CRC-16, CRC-16-CCITT, CRC-16-XMODEM, CRC-32,
ELF-32, FCS-16, FCS-32, FNV-32, FNV-64, GHash-32-3, GHash-32-5, GOST-Hash, HAVAL (3/4/5, 256),
MD2, MD4, MD5, SHA-1, SHA-256, SHA-384, SHA-512, Size64, Tiger, XUM32. For a full list see the
ReHash documentation manual (included in downloadable package).
It is possible to compute HMACs of all algorithms.
The tool can output the hashes in various formats like plain text, HTML, XML and CSV.
ReHash can be fully configured using some of the many command line arguments which
can be passed to the tool. You can selectively activate/disable hash algorithms and set
scanning options like scanning subdirectories recursively and excluding/including files
using advanced file pattern matching.
[SourceForge.net Project Page],
Language: neutral. System requirements: C++ compiler.|
CSHA1 is a C++ class implementation of the US Secure Hash Algorithm 1 as defined
in the FIPS PUB 180-1 standard.
SHA-1 is a very secure hash algorithm, which has been designed by the NIST along with the NSA. It produces a 160-bit
hash value, and therefore is more collision-resistant and resistant against birthday-attacks than MD5 or MD2 for example.
New in version 2.1:
- Deconstructor (resetting internal variables) is now only
SHA1_WIPE_VARIABLES is defined (which is the
- Renamed inclusion guard to contain a GUID.
- Demo application is now using C++/STL objects and functions.
- Unicode build of the demo application now outputs the hashes of both
the ANSI and Unicode representations of strings.
- Various other demo application improvements.
CSHA1 class source code with demo project (ZIP, 82 KB)
Source code only (ZIP, 6 KB)
Language: neutral. System requirements: .NET compiler.|
BlakeSharp is an implementation of the BLAKE hash algorithm.
See the BlakeSharp project page.
Language: neutral. System requirements: MFC / C++ compiler.|
Secure Password Edit controls are resistant to window style changers and programs that
read out the text of password edits.
New in version 1.3:
CSecureEdit is now distributed under a BSD-style license.
- In Unicode builds,
CSecureEdit now uses a dot as password masking
- The password control style is now set (when the user tries to copy
data out of the control, Windows shows a failure tooltip).
- Added ability to accept text drops.
- The password can now be retrieved using the
(instead of directly accessing the internal
- Improved change detection logic and performance of mask string
- Updated project files for Visual Studio 2008.
- Added support for Aero theming in the demo application.
- Minor other code improvements.
Demo application with source code (ZIP, 747 KB)
Language: neutral. System requirements: MFC / C++ compiler.|
Improved version of the CSecureEdit class, but also has some additional limitations (no selections
are possible). The CSecureEditEx class is, in contrast to the lite CSecureEdit class,
resistant against process memory dumpers. The entered passwords aren't visible in
the process memory of the application.
Demo project with source code (ZIP, 72 KB)
Source code only (ZIP, 18 KB)
Language: Neutral. System requirements: Windows.|
This library securely encrypts and decrypts files. It uses the Advanced Encryption Standard (AES)
and SHA-256 algorithms. KeeCryptLib attempts to make dictionary-attacks a bit harder
by encrypting the master key multiple times before using it (this adds a linear
time factor). In order to generate the IVs and master seeds, it collects various
more or less random things from Windows (mouse cursor position, time, memory
KeeCryptLib is distributed under the terms of the BSD license. Feel free to use
the library in your project (the API is pretty simple, have a look at it!).
Source code, demos and documentation (ZIP, 155 KB)