Category: Crypto

Side-Channel Attack Lab

scale: Side-Channel Attack Lab

SCALE: Side-Channel Attack Lab. Exercises Alongside the implementation of cryptography in hardware and software, attacks on those implementations (plus associated countermeasures) form a central challenge in cryptographic engineering. This topic is sometimes termed physical security, but, either...

REBEL-FRAMEWORK

rebel-framework: Advanced and easy to use penetration testing framework

REBEL-FRAMEWORK Advanced and easy to use penetration testing framework Module├ ├ net/iface ➤ Interface info. ├ net/map ➤ Hosts live Scan in LAN. ├ net/scan ➤ Scan [Ports, OS, Etc] IP. ├ net/vuln ➤...

CryKeX

CryKeX: Linux Memory Cryptographic Keys Extractor

CryKeX – Linux Memory Cryptographic Keys Extractor Properties: Cross-platform Minimalism Simplicity Interactivity Compatibility/Portability Application Undependable Process Wrapping Process Injection Limitations: AES and RSA keys only Fails most of the time for Firefox browser Won’t work...

All You Need to Know About PKT Cryptocurrency

Before now, people have desired to create a passive source of income from the assets that they already own. To a large extent, that desire is being realized today via a sharing economy. This...

Ciphey

Ciphey v5.14 releases: automated decryption tool

Ciphey Ciphey is an automated decryption tool. Input encrypted text, get the decrypted text back. “What type of encryption?” That’s the point. You don’t know, you just know it’s possibly encrypted. Ciphey will figure...