Category: Crypto

stegcloak

stegcloak v1.1.1 releases: The Cloak of Invisibility for your texts

StegCloak StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside the text by compressing and encrypting the secret before cloaking it with special Unicode invisible characters. It...

scallion

scallion: GPU-based Onion Hash generator

Scallion Scallion lets you create vanity GPG keys and .onion addresses (for Tor’s hidden services) using OpenCL. Scallion runs on Mono (tested in Arch Linux) and .NET 3.5+ (tested on Windows 7 and Server 2008). How...

BLAKE3

BLAKE3 v1.0 releases: The BLAKE3 cryptographic hash function

BLAKE3 is a cryptographic hash function that is: Much faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2. Secure, unlike MD5 and SHA-1. And secure against length extension, unlike SHA-2. Highly parallelizable across any number of threads...

cryptovenom

cryptovenom: The Cryptography Swiss Army Knife

CryptoVenom CryptoVenom is an OpenSource tool which contains a lot of cryptosystems and cryptoanalysis methods all in one, including classical algorithms, hash algorithms, encoding algorithms, logic gates, mathematical functions, modern symmetric and asymmetric encryptions,...

Side-Channel Attack Lab

scale: Side-Channel Attack Lab

SCALE: Side-Channel Attack Lab. Exercises Alongside the implementation of cryptography in hardware and software, attacks on those implementations (plus associated countermeasures) form a central challenge in cryptographic engineering. This topic is sometimes termed physical security, but, either...

REBEL-FRAMEWORK

rebel-framework: Advanced and easy to use penetration testing framework

REBEL-FRAMEWORK Advanced and easy to use penetration testing framework Module├ ├ net/iface ➤ Interface info. ├ net/map ➤ Hosts live Scan in LAN. ├ net/scan ➤ Scan [Ports, OS, Etc] IP. ├ net/vuln ➤...

Acra

Acra v0.85 releases: database protection suite

What is Acra Acra helps you easily secure your databases in distributed, microservice-rich environments. It allows you to selectively encrypt sensitive records with strong multi-layer cryptography, detect potential intrusions and SQL injections and cryptographically compartmentalize...

CryKeX

CryKeX: Linux Memory Cryptographic Keys Extractor

CryKeX – Linux Memory Cryptographic Keys Extractor Properties: Cross-platform Minimalism Simplicity Interactivity Compatibility/Portability Application Undependable Process Wrapping Process Injection Limitations: AES and RSA keys only Fails most of the time for Firefox browser Won’t work...