Category: Crypto

Padding Oracle attacks

rustpad v1.8.1 releases: Multi-threaded Padding Oracle attacks

rustpad rustpad is a multi-threaded successor to the classic padbuster, written in Rust. It abuses a Padding Oracle vulnerability to decrypt any cypher text or encrypt arbitrary plain text without knowing the encryption key! Features Decryption of...

Hash type identifier

haiti v2.1 releases: Hash type identifier

haiti A CLI tool (and library) to identify hash types (hash type identifier). Features 442+ hash types detected Modern algorithms supported (SHA3, Keccak, Blake2, etc.) Hashcat and John the Ripper references CLI tool &...

network security tool suite

CaptfEncoder v3.1.2 releases: extensible cross platform network security tool suite

Captfencoder Captfencoder is an extensible cross-platform network security tool suite, providing network security-related code conversion, classical cryptography, cryptography, asymmetric encryption, special coding, miscellaneous tools, and aggregating all kinds of online tools.   CaptfEncoder all...

StegoCracker

StegoCracker: open-source and free steganography tool

StegoCracker What is steganography Steganography is the art of hiding a secret message within a normal message. This is used to transfer some secret message to another person; with this technique, no one else...

All You Need to Know About PKT Cryptocurrency

Before now, people have desired to create a passive source of income from the assets that they already own. To a large extent, that desire is being realized today via a sharing economy. This...

Quantum Blockchain

teatime v0.3.1 releases: A Blockchain RPC Attack Framework

Teatime – A Blockchain RPC Attack Framework Teatime is an RPC attack framework aimed at making it easy to spot misconfigurations in blockchain nodes. It detects a large variety of issues, ranging from information...

stegbrute

stegbrute: Fast Steganography bruteforce tool

stegbrute stegbrute is a fast steganography brute force tool written in Rust using also threads to achieve a faster execution. Usage It is very simple to use and it gives you many options, you...

Damn Vulnerable Crypto App

Damn Vulnerable Crypto App: really insecure crypto app

Damn Vulnerable Crypto App Damn Vulnerable Crypto App is an app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit more about crypto,...

cryptr

GG-AESY: Hide cool stuff in images

GG-AESY GG-AESY does the following things: Can hide AES-256 encryption keys or both keys and IV’s (Initialization Vectors) Can hide payloads both encrypted and unencrypted Hiding is done in 2 different ways: Random mode:...

Ciphey

Ciphey v5.14 releases: automated decryption tool

Ciphey Ciphey is an automated decryption tool. Input encrypted text, get the decrypted text back. “What type of encryption?” That’s the point. You don’t know, you just know it’s possibly encrypted. Ciphey will figure...

basecrack

basecrack: Base Scheme Decoder

BaseCrack BaseCrack is a tool written in Python that can decode all alphanumeric base encoding schemes. This tool can accept single user input, multiple inputs from a file, input from the argument and decode...