Category: Crypto

Hash type identifier

haiti v1.3 releases: Hash type identifier

haiti A CLI tool (and library) to identify hash types (hash type identifier). Features 442+ hash types detected Modern algorithms supported (SHA3, Keccak, Blake2, etc.) Hashcat and John the Ripper references CLI tool &...

network security tool suite

CaptfEncoder v3.1.2 releases: extensible cross platform network security tool suite

Captfencoder Captfencoder is an extensible cross-platform network security tool suite, providing network security-related code conversion, classical cryptography, cryptography, asymmetric encryption, special coding, miscellaneous tools, and aggregating all kinds of online tools.   CaptfEncoder all...

stegcloak

stegcloak v1.1.1 releases: The Cloak of Invisibility for your texts

StegCloak StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside the text by compressing and encrypting the secret before cloaking it with special Unicode invisible characters. It...

scallion

scallion: GPU-based Onion Hash generator

Scallion Scallion lets you create vanity GPG keys and .onion addresses (for Tor’s hidden services) using OpenCL. Scallion runs on Mono (tested in Arch Linux) and .NET 3.5+ (tested on Windows 7 and Server 2008). How...

cryptovenom

cryptovenom: The Cryptography Swiss Army Knife

CryptoVenom CryptoVenom is an OpenSource tool which contains a lot of cryptosystems and cryptoanalysis methods all in one, including classical algorithms, hash algorithms, encoding algorithms, logic gates, mathematical functions, modern symmetric and asymmetric encryptions,...

Side-Channel Attack Lab

scale: Side-Channel Attack Lab

SCALE: Side-Channel Attack Lab. Exercises Alongside the implementation of cryptography in hardware and software, attacks on those implementations (plus associated countermeasures) form a central challenge in cryptographic engineering. This topic is sometimes termed physical security, but, either...

REBEL-FRAMEWORK

rebel-framework: Advanced and easy to use penetration testing framework

REBEL-FRAMEWORK Advanced and easy to use penetration testing framework Module├ ├ net/iface ➤ Interface info. ├ net/map ➤ Hosts live Scan in LAN. ├ net/scan ➤ Scan [Ports, OS, Etc] IP. ├ net/vuln ➤...

CryKeX

CryKeX: Linux Memory Cryptographic Keys Extractor

CryKeX – Linux Memory Cryptographic Keys Extractor Properties: Cross-platform Minimalism Simplicity Interactivity Compatibility/Portability Application Undependable Process Wrapping Process Injection Limitations: AES and RSA keys only Fails most of the time for Firefox browser Won’t work...