![]() Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks). Hash files, strings, input streams and network resources in various common algorithms simultaneously.Ī tool implemented in Java for generic steganography, with support for password-based encryption of the data. Tool to help guess a files 256 byte XOR key by using frequency analysis. Read a private key from stdin and output formatted data values. Recovers the public key used to sign JWT tokens.Ī project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.Ī library to access the BitLocker Drive Encryption (BDE) format.Ī tool to convert unencrypted block devices to encrypted LUKS devices in-place. Standard for creating SSL client fingerprints in an easy to produce and shareable way. Pure Python hash length extension module. Generate HDCP source and sink keys from the leaked master key. Set of tools to generate plainmasterkeys (rainbowtables) and hashes for hashcat and John the Ripper Software to identify the different types of hashes used to encrypt data.Ī tool to exploit the hash length extension attack in various hashing algorithms. Search for leaked passwords while maintaining a high level of privacy using the k-anonymity method.Ĭross-platform tools to message digests for any number of filesĪ tool to search files for matching password hash types and other interesting data. Software to identify the different types of hashes used to encrypt data and especially passwords. Simple, secure and performance file encryption tool written in CĪ library which provides a secure layer over a reliable transport layer (Version 2)Ī python script which scraps online hash crackers to find cleartext of a hash. Read BitLocker encrypted volumes under Linux.Īn automated, modular cryptanalysis tool.Ĭrack different types of hashes using free online services.Ī tool for predicting the output of random number generators. Generic data encoding/decoding application built with PyQt5. Tool that can detect and decode encoded strings, recursively. TCP/UDP symmetric encryption tunnel wrapper.Ī tool to perform (higher-order) correlation power analysis attacks (CPA). Reads data from stdin and outputs encrypted or decrypted results to stdout.Ī password-hashing function (reference C implementation)Ī collection of practical application cryptanalysis tools.Ī better SSL cipher checker using gnutls.Ī CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.Ī tool to determine the crypto/encoding algorithm used according to traces of its representation.Īn interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |