Software Alternatives & Reviews

Suricata VS Jacksum

Compare Suricata VS Jacksum and see what are their differences

Suricata logo Suricata

Suricata is a high performance Network IDS, IPS and Network Security Monitoring engine.

Jacksum logo Jacksum

Jacksum is a free, open source, cross-platform, feature-rich, multi-threaded command line tool for calculating hash values, verifying data integrity, finding files by their fingerprints, and finding algorithms to hash values. 489 hash functions!
  • Suricata Landing page
    Landing page //
    2022-11-06
  • Jacksum Landing page
    Landing page //
    2023-04-08

Jacksum supports 489 algorithms, including the most common cryptographic and non-cryptographic hash functions. Jacksum also supports the "Rocksoft (tm) Model CRC Algorithm" to customize your CRC.

Jacksum can perform a verification of hashes against a set of known hashes, and it can detect matching, non-matching, missing, and new files.

Jacksum takes advantage of modern multi-processor/multi-core environments, and saves time by hashing multiple files in parallel, and by computing hashes with multiple algorithms in parallel.

Output can occur in predefined standard formats (BSD-, GNU/Linux-, or Solaris style, SFV or FCIV) or in a user-defined format which is highly customizable, including many encodings for representing hash values, including binary, decimal, octal, hexadecimal with lowercase or uppercase letters, Base16, Base32 with and without padding, Base32hex with and without padding, Base64 with and without padding, Base64url with and without padding, BubbleBabble, and z-base-32.

Input data can come from files, standard input stream (stdin), or provided directly by command line arguments.

Jacksum supports many charsets for reading and writing files properly, and it comes with full support for all common Unicode aware charsets such as UTF-8, UTF-16, UTF-16BE, UTF-16LE, UTF-32, UTF-32BE, UTF-32LE, GB18030, etc.

With Jacksum you can also find the algorithm used to calculate a checksum, CRC, hash or find files that match a given hash value.

Suricata

$ Details
Platforms
-
Release Date
-

Jacksum

$ Details
Platforms
Windows Linux Mac OSX
Release Date
2023 August

Suricata features and specs

No features have been listed yet.

Jacksum features and specs

  • algorithms supported: 489
  • algorithm types: cryptographic and non-cryptographic hash functions, CRCs and checksums
  • Customize CRCs from 1 to 64 bit width: yes
  • encodings for hash representation: 14
  • predefined styles to read and write files that contain hash values: 10
  • Calculation of hash values: yes
  • Find ok/failed/missing/new files (verify file/data integrity): yes
  • Find files by their fingerprints (positive matching): yes
  • Find files that do not match fingerprints (negative matching): yes
  • Find all duplicates of a file by its hash value: yes
  • Find the algorithm(s) that generated a certain hash value: yes

Suricata videos

Suricata Network IDS/IPS Installation, Setup, and How To Tune The Rules & Alerts on pfSense 2020

More videos:

  • Review - pfsense With Suricata Intrusion Detection System: How & When it works and What It Misses
  • Review - Test Case: Suricata VS Snort IDS

Jacksum videos

No Jacksum videos yet. You could help us improve this page by suggesting one.

+ Add video

Category Popularity

0-100% (relative to Suricata and Jacksum)
Security & Privacy
100 100%
0% 0
OS & Utilities
0 0%
100% 100
Cyber Security
100 100%
0% 0
Cloud Storage
0 0%
100% 100

Questions and Answers

As answered by people managing Suricata and Jacksum.

What makes your product unique?

Jacksum's answer:

Jacksum (JAva ChecKSUM) is a free, open source, cross-platform, feature-rich, multi-threaded command line utility that makes hash functions available to you. It covers many types of use cases where hash values are needed:

  • Calculating of hash values of almost any input
  • Finding OK/failed/missing/new files (verify file/data integrity)
  • Finding files by their fingerprints for positive matching
  • Finding files that do not match certain fingerprints for negative matching
  • Finding all duplicates of a file by its hash value
  • Finding the algorithm(s) that generated a certain hash value

In order to achieve the goals above Jacksum supports you with

  • 489 standard hash functions
  • Customizable CRCs from 1 to 64 bit width
  • 60+ options to control Jacksum's behavior on the command line
  • 14 standard encodings for representing hash values
  • 10 predefined styles for reading and writing files that contain hash values
  • 8600+ lines of manpage with descriptions, examples, and compatibility lists for the most common algorithms

Jacksum is also a library. You can use it for your projects. It is written entirely in Java

How would you describe your primary audience?

Jacksum's answer:

Jacksum is for users with security in mind, advanced users, sysadmins, students of informatics, computer scientists, cybersecurity engineers, forensics engineers, penetration testers, white hat hackers, reverse engineers, CRC researchers, etc.

Which are the primary technologies used for building your product?

Jacksum's answer:

Java, a programming language for building robust cross platform software.

Why should a person choose your product over its competitors?

Jacksum's answer:

It is free, open source, cross platform, multi-threaded, reliable, and it comes with a bunch of features, see also https://github.com/jonelo/jacksum/wiki/Features

What's the story behind your product?

Who are some of the biggest customers of your product?

User comments

Share your experience with using Suricata and Jacksum. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare Suricata and Jacksum

Suricata Reviews

The Top 14 Free and Open Source SIEM Tools For 2022
Prelude is a universal SIEM system and it collects, normalizes, sorts, aggregates, correlates and reports all security-related events independent of the product brand or licence giving rise to such events. Third-party agents to this tool include Auditd, OSSEC, Suricata, Kismet and ClamAV.
Source: logit.io

Jacksum Reviews

We have no reviews of Jacksum yet.
Be the first one to post

Social recommendations and mentions

Based on our record, Suricata seems to be a lot more popular than Jacksum. While we know about 12 links to Suricata, we've tracked only 1 mention of Jacksum. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Suricata mentions (12)

  • Who does check linux distros of malware - open source
    Linux has (free) tools to improve security and detect/remove malware: Lynis,Chkrootkit,Rkhunter,ClamAV,Vuls,LMD,radare2,Yara,ntopng,maltrail,Snort,Suricata... Source: 5 months ago
  • Risks of hosting a website out of my house
    Monitoring & Active Measures - Exporting firewall events to an external time-series database like I describe above is good to see who is touching your firewall or accessing your web site. Using an Intrusion Detection System / Intrusion Prevention System (IDS/IPS) such as open-source Suricata, which is a free package on pfSense, and deploying file system integrity monitoring, such as the open-source Wazuh on the... Source: 6 months ago
  • Server Hardening
    Active Measures - Includes (IDS/IPS) such as open-source Suricata or Snort on pfSense, and File Integrity Monitoring (FIM), such as the commercial Tripwire and dated, open-source Tripwire, or the open-source Wazuh installed on servers. These can be combined into a Security Information and Event Management (SIEM) system like the open-source solution, Security Onion. Wazuh itself has evolved into a SIEM. Source: over 1 year ago
  • Help with server build
    Active measures may include an intrusion detection system / intrusion prevention systems (IDS/IPS) such as open-source Suricata on the firewall, and installing file system integrity monitoring, such as the open-source Wazuh on the exposed server. These are combined in one open-source solution, Security Onion. Source: over 1 year ago
  • Would love a guide to Unifi Threat Management similar to your "Advanced Wifi Settings" Guide
    Thanks! Was there something in particular you were wondering about? The built-in IDS/IPS is just Suricata under the hood - https://suricata.io/. Source: over 1 year ago
View more

Jacksum mentions (1)

  • Why are there no checksum apps for MacOS?
    Having said that I believe this is what you are looking for https://apps.apple.com/gr/app/hash-calculator-2/id463459213?mt=12 Or Https://github.com/sunjw/fhash/ Https://www.quickhash-gui.org Https://jacksum.net/en/index.html. Source: about 1 year ago

What are some alternatives?

When comparing Suricata and Jacksum, you can also consider the following products

snort - Snort is a free and open source network intrusion prevention system.

HashCheck Shell Extension - File-integrity verification with CRC-32, MD5, SHA-1, SHA-2 and SHA-3, integrated into Windows...

Zeek - Buy and sell gift vouchers

RapidCRC Unicode - RapidCRC is an open source CRC/MD5/SHA hashing program.

Wazuh - Open Source Host and Endpoint Security

Md5Checker - Md5Checker is a free, faster, lightweight and easy-to-use tool to manage, calculate and verify MD5 checksum of multiple files/folders.