Category: Crypto

Ethereum exploitation

theo v0.8.2 releases: Ethereum recon and exploitation tool

Theo Theo aims to be an exploitation framework and a blockchain recon and interaction tool. Features: automatic smart contract scanning which generates a list of possible exploits. generating and sending transactions to exploit a...

stegify

stegify: hiding any file within an image

stegify stegify is a simple command-line tool capable of fully transparent hiding any file within an image. This technique is known as LSB (Least Significant Bit) steganography. Install $ go get -u github.com/DimitarPetrov/stegify Use...

RSA Attacks

X-RSA: RSA Attacks Tool

X-RSA What’s X-RS A? it’s a Tool Which contains a many of attack types in RSA such as Hasted, Common Modulus, Chinese Remainder Theorem, Wiener … etc, and it’s still under development and adding...

Steganography

LSB-Steganography: steganography files into images

LSB-Steganography Python program based on stegonographical methods to hide files in images using the Least Significant Bit technique. I used the most basic method which is the least significant bit. A color pixel is...

SSL/TLS key

SSL/TLS: What’s in a key?

Introduction SSL/TLS is the foundation of cryptography for computer systems. The reason it has proven so popular and persistent is that it is agnostic of the protocol being encrypted. Originally, security wasn’t on everyone’s...

Damn Vulnerable Crypto Wallet

Damn Vulnerable Crypto Wallet

DVCW Damn Vulnerable Crypto Wallet is an extremely insecure Ethereum crypto wallet written in JavaScript. It has three main modules: Desktop app: built with Electron and Vue Web API: built with NodeJS using Express,...