Category: Crypto

stegcloak

stegcloak: The Cloak of Invisibility for your texts

StegCloak StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside the text by compressing and encrypting the secret before cloaking it with special Unicode invisible characters. It...

scallion

scallion: GPU-based Onion Hash generator

Scallion Scallion lets you create vanity GPG keys and .onion addresses (for Tor’s hidden services) using OpenCL. Scallion runs on Mono (tested in Arch Linux) and .NET 3.5+ (tested on Windows 7 and Server 2008). How...

openstego

openstego v0.8.6 releases: a steganography application

OpenStego OpenStego is a steganography application that provides two functionalities: Data Hiding: It can hide any data within a cover file (e.g. images). Watermarking: Watermarking files (e.g. images) with an invisible signature. It can...

padding-oracle-attacker

padding-oracle-attacker: execute padding oracle attacks easily

padding-oracle-attacker CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI. Install Make sure Node.js is installed, then run $ npm install –global padding-oracle-attacker or $ yarn global...

BLAKE3

BLAKE3 v1.5 releases: The BLAKE3 cryptographic hash function

BLAKE3 is a cryptographic hash function that is: Much faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2. Secure, unlike MD5 and SHA-1. And secure against length extension, unlike SHA-2. Highly parallelizable across any number of threads...

PAdding oracle eXploiter

pax v0.2.2 releases: CLI tool for PKCS7 padding oracle attacks

pax Exploit padding oracles for fun and profit! Pax (PAdding oracle eXploiter) is a tool for exploiting padding oracles in order to: Obtain plaintext for a given piece of CBC encrypted data. Obtain encrypted...

cryptovenom

cryptovenom: The Cryptography Swiss Army Knife

CryptoVenom CryptoVenom is an OpenSource tool which contains a lot of cryptosystems and cryptoanalysis methods all in one, including classical algorithms, hash algorithms, encoding algorithms, logic gates, mathematical functions, modern symmetric and asymmetric encryptions,...

REBEL-FRAMEWORK

rebel-framework: Advanced and easy to use penetration testing framework

REBEL-FRAMEWORK Advanced and easy to use penetration testing framework Module├ ├ net/iface ➤ Interface info. ├ net/map ➤ Hosts live Scan in LAN. ├ net/scan ➤ Scan [Ports, OS, Etc] IP. ├ net/vuln ➤...

stegify

stegify v1.2 releases: hiding any file within an image

stegify stegify is a simple command-line tool capable of fully transparent hiding any file within an image. This technique is known as LSB (Least Significant Bit) steganography. Changelog v1.2 Encoding/Decoding data file in/from multiple...