Category: Crypto

PAdding oracle eXploiter

pax v0.2.2 releases: CLI tool for PKCS7 padding oracle attacks

pax Exploit padding oracles for fun and profit! Pax (PAdding oracle eXploiter) is a tool for exploiting padding oracles in order to: Obtain plaintext for a given piece of CBC encrypted data. Obtain encrypted...

Quantum Blockchain

teatime: A Blockchain RPC Attack Framework

Teatime – A Blockchain RPC Attack Framework Teatime is an RPC attack framework aimed at making it easy to spot misconfigurations in blockchain nodes. It detects a large variety of issues, ranging from information...

stegbrute

stegbrute: Fast Steganography bruteforce tool

stegbrute stegbrute is a fast steganography brute force tool written in Rust using also threads to achieve a faster execution. Usage It is very simple to use and it gives you many options, you...

Ciphey

Ciphey v5.11 releases: automated decryption tool

Ciphey Ciphey is an automated decryption tool. Input encrypted text, get the decrypted text back. “What type of encryption?” That’s the point. You don’t know, you just know it’s possibly encrypted. Ciphey will figure...

Damn Vulnerable Crypto App

Damn Vulnerable Crypto App: really insecure crypto app

Damn Vulnerable Crypto App Damn Vulnerable Crypto App is an app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit more about crypto,...

cryptr

GG-AESY: Hide cool stuff in images

GG-AESY GG-AESY does the following things: Can hide AES-256 encryption keys or both keys and IV’s (Initialization Vectors) Can hide payloads both encrypted and unencrypted Hiding is done in 2 different ways: Random mode:...