Jump to content

Crypt.au3 Hasher Example v1.0

Recommended Posts

Crypt.au3 Hasher Example v1.0

I needed something to generate hash files of multiple files so I whipped this up really quick.

It utitlizes the standard Crypt.au3 UDF and by Yashied.


Essentially a very basic and unoptimized version of HashMyFiles.

When I get the time, I'll add more features, fix bugs, etc.


  • Drag and drop support
  • Multiple file support
  • Save results to text file
  • Uses standard hashing functions

Posted Image


Crypt.au3 Hasher v1.0 Example by money
Licensed under the public domain, use as you wish.




1.0 - 2011/11/23: Initial release (reuploaded correct version)

Edited by money
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    No registered users viewing this page.

  • Similar Content

    • By argumentum
      so there is this post "Holographic Encryption with DARTIS" and the RSA came up.
      There is  _RSA_crypt.7z  from autoit-script.ru but the file is not available ( if anyone has the file, please get me a working link ) , so I don't know what or how it was done.
      My idea is to do the public key / private key (RSA) to exchange the hash/password ( call it what you will ), then, carry the rest of the communication with $CALG_AES_256 or the like. So it'd be doing a hybrid TCP/IP SSL, let's call it TCL 2.5  
      Anyhow, I need help for the simple reason that I'm quite clueless.
      CryptoAPI Cryptographic Service Providers may have a clue via the CryptoAPI ( but to me is all just words ).
      CryptEncrypt function say that: 
      The Microsoft Enhanced Cryptographic Provider supports direct encryption with RSA public keys and decryption with RSA private keys. The encryption uses PKCS #1 padding. On decryption, this padding is verified. The length of plaintext data that can be encrypted with a call to CryptEncrypt with an RSA key is the length of the key modulus minus eleven bytes. The eleven bytes is the chosen minimum for PKCS #1 padding. The ciphertext is returned in little-endian format. so it should be possible from server 2003 / XP onwards.
      Thank you all who dare to go at it  
  • Create New...