Category: Crypto

Ethereum exploitation

theo v0.8.2 releases: Ethereum recon and exploitation tool

Theo Theo aims to be an exploitation framework and a blockchain recon and interaction tool. Features: automatic smart contract scanning which generates a list of possible exploits. generating and sending transactions to exploit a...

RSA Attacks

X-RSA: RSA Attacks Tool

X-RSA What’s X-RS A? it’s a Tool Which contains a many of attack types in RSA such as Hasted, Common Modulus, Chinese Remainder Theorem, Wiener … etc, and it’s still under development and adding...

Steganography

LSB-Steganography: steganography files into images

LSB-Steganography Python program based on stegonographical methods to hide files in images using the Least Significant Bit technique. I used the most basic method which is the least significant bit. A color pixel is...

SSL/TLS key

SSL/TLS: What’s in a key?

Introduction SSL/TLS is the foundation of cryptography for computer systems. The reason it has proven so popular and persistent is that it is agnostic of the protocol being encrypted. Originally, security wasn’t on everyone’s...

Damn Vulnerable Crypto Wallet

Damn Vulnerable Crypto Wallet

DVCW Damn Vulnerable Crypto Wallet is an extremely insecure Ethereum crypto wallet written in JavaScript. It has three main modules: Desktop app: built with Electron and Vue Web API: built with NodeJS using Express,...

database protection

Acra v0.95 releases: database protection suite

What is Acra Acra helps you easily secure your databases in distributed, microservice-rich environments. It allows you to selectively encrypt sensitive records with strong multi-layer cryptography, detect potential intrusions and SQL injections and cryptographically compartmentalize...