Category: Crypto

stegcloak

stegcloak: The Cloak of Invisibility for your texts

StegCloak StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside the text by compressing and encrypting the secret before cloaking it with special...

scallion

scallion: GPU-based Onion Hash generator

Scallion Scallion lets you create vanity GPG keys and .onion addresses (for Tor’s hidden services) using OpenCL. Scallion runs on Mono (tested in Arch Linux) and .NET 3.5+ (tested on Windows 7...

openstego

openstego v0.8.6 releases: a steganography application

OpenStego OpenStego is a steganography application that provides two functionalities: Data Hiding: It can hide any data within a cover file (e.g. images). Watermarking: Watermarking files (e.g. images) with an...

padding-oracle-attacker

padding-oracle-attacker: execute padding oracle attacks easily

padding-oracle-attacker CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI. Install Make sure Node.js is installed, then run $ npm install –global padding-oracle-attacker...

cryptovenom

cryptovenom: The Cryptography Swiss Army Knife

CryptoVenom CryptoVenom is an OpenSource tool which contains a lot of cryptosystems and cryptoanalysis methods all in one, including classical algorithms, hash algorithms, encoding algorithms, logic gates, mathematical functions, modern...

stegify

stegify v1.2 releases: hiding any file within an image

stegify stegify is a simple command-line tool capable of fully transparent hiding any file within an image. This technique is known as LSB (Least Significant Bit) steganography. Changelog v1.2 Encoding/Decoding...

Ethereum exploitation

theo v0.8.2 releases: Ethereum recon and exploitation tool

Theo Theo aims to be an exploitation framework and a blockchain recon and interaction tool. Features: automatic smart contract scanning which generates a list of possible exploits. generating and sending...

RSA Attacks

X-RSA: RSA Attacks Tool

X-RSA What’s X-RS A? it’s a Tool Which contains a many of attack types in RSA such as Hasted, Common Modulus, Chinese Remainder Theorem, Wiener … etc, and it’s still...