SSL/TLS: What’s in a key?
Introduction SSL/TLS is the foundation of cryptography for computer systems. The reason it has proven so popular and persistent is that it is agnostic of the protocol being encrypted. Originally,...
Introduction SSL/TLS is the foundation of cryptography for computer systems. The reason it has proven so popular and persistent is that it is agnostic of the protocol being encrypted. Originally,...
deen An application that allows applying encoding, compression, and hashing to generic input data. It is meant to be a handy tool for quick encoding/decoding tasks for data to be...
DVCW Damn Vulnerable Crypto Wallet is an extremely insecure Ethereum crypto wallet written in JavaScript. It has three main modules: Desktop app: built with Electron and Vue Web API: built...
Solve Crypto With Force (SCWF) CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way. Click here for the live version (use Chrome). Crypto CTF (sub)challenges can...
xortool.py A tool to do some xor analysis: guess the key length (based on the count of equal chars) guess the key (base on knowledge of most frequent char) Changelog...
Crypto / Forensics / Network PenTest / Reverse Engineering / WebApp PenTest
by do son · Published April 4, 2019
>_ Root the Box Root the Box is a real-time capture the flag (CTF) scoring engine for computer wargames where hackers can practice and learn. The application can be easily...
RsaCtfTool RSA tool for ctf – uncipher data from weak public key and try to recover private key Automatic selection of best attack for the given public key Attacks :...
PacketWhisper PacketWhisper – Stealthily Transfer Data & Defeat Attribution Using DNS Queries & Text-Based Steganography, without the need for attacker-controlled Name Servers or domains; Evade DLP/MLS Devices; Defeat Data- &...
Crypto / Network PenTest / WebApp PenTest
by do son · Published December 8, 2018 · Last modified September 28, 2024
BabySploit is a penetration testing toolkit aimed at making it easy to learn how to use bigger, more complicated frameworks like Metasploit. With a very easy to use UI and...
Hash-Buster Hash Buster is a python script which uses several online hash crackers to find cleartext of a hash in less than 5 seconds. Features of Hash Buster: Automatic...
Ciphr Ciphr is a CLI tool for performing and composing encoding, decoding, encryption, decryption, hashing, and other various operations on streams of data. It takes provided data, file data, or...
SCALE: Side-Channel Attack Lab. Exercises Alongside the implementation of cryptography in hardware and software, attacks on those implementations (plus associated countermeasures) form a central challenge in cryptographic engineering. This topic is sometimes termed...
OWASP DeepViolet TLS/SSL API DeepViolet is a TLS/SSL scanning API written in Java. To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API....
TLS Prober TLS Prober is a tool for identifying the implementation in use by SSL/TLS servers. It analyses the behavior of a server by sending a range of probes then...
TLSPretense — SSL/TLS Client Testing Framework TLSPretense provides a test framework for testing SSL certificate validation. It generates a set of certificates containing specific flaws, and it presents the certificates...