Category: Crypto

Damn Vulnerable Crypto App

Damn Vulnerable Crypto App: really insecure crypto app

Damn Vulnerable Crypto App Damn Vulnerable Crypto App is an app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit more about crypto,...

cryptr

GG-AESY: Hide cool stuff in images

GG-AESY GG-AESY does the following things: Can hide AES-256 encryption keys or both keys and IV’s (Initialization Vectors) Can hide payloads both encrypted and unencrypted Hiding is done in 2 different ways: Random mode:...

BLAKE3

BLAKE3 v0.3.7 releases: The BLAKE3 cryptographic hash function

BLAKE3 is a cryptographic hash function that is: Much faster than MD5, SHA-1, SHA-2, SHA-3, and BLAKE2. Secure, unlike MD5 and SHA-1. And secure against length extension, unlike SHA-2. Highly parallelizable across any number of threads...

basecrack

basecrack: Base Scheme Decoder

BaseCrack BaseCrack is a tool written in Python that can decode all alphanumeric base encoding schemes. This tool can accept single user input, multiple inputs from a file, input from the argument and decode...

stegcloak

stegcloak v1.1.1 releases: The Cloak of Invisibility for your texts

StegCloak StegCloak is a pure JavaScript steganography module designed in functional programming style, to hide secrets inside the text by compressing and encrypting the secret before cloaking it with special Unicode invisible characters. It...

scallion

scallion: GPU-based Onion Hash generator

Scallion Scallion lets you create vanity GPG keys and .onion addresses (for Tor’s hidden services) using OpenCL. Scallion runs on Mono (tested in Arch Linux) and .NET 3.5+ (tested on Windows 7 and Server 2008). How...