CyoHash is a simple shell extension that is used from within Windows Explorer to calculate the MD5 hash, SHA1 hash, or CRC32 checksum of a file. (Additional SHA256, SHA384, and SHA512 algorithms are available for users of Windows XP SP3 or newer.)

Features

  • MD5
  • SHA1
  • SHA256
  • SHA384
  • SHA512
  • CRC32
  • Windows
  • Shell extension

Project Samples

Project Activity

See All Activity >

Categories

Security

License

BSD License

Follow CyoHash

CyoHash Web Site

Other Useful Business Software
Automate Proposals with AI in Microsoft Word. Icon
Automate Proposals with AI in Microsoft Word.

Streamline proposal creation with the smartest AI, the best content, seamless integration with Microsoft Word, and unmatched efficiency.

Automate your best practices, processes, and standards to guide your proposal writers, sales teams, and subject experts. And don’t worry, it’s so easy to use they will use it. We would love the opportunity to help you quantify the impact your business can expect from investing in Expedience Software. Click here to request a Return on Investment (ROI) calculation. In this 15-minute session, we will ask 20 simple questions to assess and grade your current proposal quality and scalability. Manual proposal processes are likely costing you far more than you realize. These models waste time and kill the productivity of proposal writers, sales team members, senior staff, and subject experts.
Learn More
Rate This Project
Login To Rate This Project

User Ratings

★★★★★
★★★★
★★★
★★
4
2
0
0
1
ease 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 5 / 5
features 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5
design 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 5 / 5
support 1 of 5 2 of 5 3 of 5 4 of 5 5 of 5 4 / 5

User Reviews

  • Thank you very much for the program!
  • 80% for first impression. Calculation is fine, call from Windows Explorer context also. The only flaw seems to be the rigidity of the output window a.k.a. inability to resize the column containing the hash result. Some hashes are too long to fit. Apart from column resize, a line-wrapping would also resolve this. As it is one has to Copy Hash/Export Hash and do the comparison with the source's hash in another environment. P.S. That said, I realize that the probability to find a pair of 'legitimate' and 'tampered with' files, for whom 45 first hex-digits of 64-digit hash would be the same, is minimal.
  • The application is helpful, thank you.
  • Very useful, easy to use
    1 user found this review helpful.
  • Works perfectly. You don't even need a readme.txt. I just downloaded it at 2:36PM and it's just now 2:39 and I managed to use download, install, find and use CyoHash to check the MD5sum of a Linux Mint distro, register on Sourceforge and come back to write this review! One of the fastest executables I have downloaded in a while.
    1 user found this review helpful.
Read more reviews >

Additional Project Details

Operating Systems

Windows

Intended Audience

End Users/Desktop

User Interface

Win32 (MS Windows)

Programming Language

C++

Related Categories

C++ Security Software

Registered

2009-08-17