bletchley|0.0.1|A collection of practical application cryptanalysis tools.|https://code.google.com/p/bletchley/
ciphertest|20.3224858|A better SSL cipher checker using gnutls.|https://github.com/OpenSecurityResearch/ciphertest
ciphr|105.db79691|A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.|https://github.com/frohoff/ciphr
codetective|39.7f44df4|A tool to determine the crypto/encoding algorithm used according to traces of its representation.|https://www.digitalloft.org/init/plugin_wiki/page/codetective
findmyhash|1.1.2|Crack different types of hashes using free online services|http://code.google.com/p/findmyhash/
gnutls2|2.12.23|A library which provides a secure layer over a reliable transport layer (Version 2)|http://gnutls.org/
hashfind|8.e9a9a14|A tool to search files for matching password hash types and other interesting data.|https://github.com/rurapenthe/hashfind
hashid|397.7e8473a|Software to identify the different types of hashes used to encrypt data.|https://github.com/psypanda/hashID
hashpump|45.2d01d3b|A tool to exploit the hash length extension attack in various hashing algorithms.|https://github.com/bwall/HashPump
hdcp-genkey|18.e8d342d|Generate HDCP source and sink keys from the leaked master key.|https://github.com/rjw57/hdcp-genkey
kraken|32.368a837|A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.|http://opensource.srlabs.de/projects/a51-decrypt
luksipc|0.01|A tool to convert unencrypted block devices to encrypted LUKS devices in-place.|http://www.johannes-bauer.com/linux/luksipc
morxkeyfmt|1.0|Read a private key from stdin and output formatted data values.|http://www.morxploit.com/tools/
nomorexor|0.1|Tool to help guess a files 256 byte XOR key by using frequency analysis|https://github.com/hiddenillusion/NoMoreXOR
openstego|0.6.1|A tool implemented in Java for generic steganography, with support for password-based encryption of the data.|http://www.openstego.info/
pacumen|1.92a0884|Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks).|https://github.com/bniemczyk/pacumen
pip3line|80.2e926b0|The Swiss army knife of byte manipulation.|https://github.com/nccgroup/pip3line
posttester|0.1|A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin.|http://packetstormsecurity.com/files/109010/MagicHash-Collision-Testing-Tool.html
pwd-hash|2.0|A password hashing tool that use the crypt function to generate the hash of a string given on standard input.|http://vladz.devzero.fr/pwd-hash.php
sbd|1.36|Netcat-clone, portable, offers strong encryption - features AES-CBC + HMAC-SHA1 encryption, program execution (-e), choosing source port, continuous reconnection with delay + more|http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=sbd
snow|20130616|Steganography program for concealing messages in text files.|http://darkside.com.au/snow/index.html
veracrypt|1.17|Disk encryption with strong security based on TrueCrypt|http://veracrypt.codeplex.com/
xorbruteforcer|0.1|Script that implements a XOR bruteforcing of a given file, although a specific key can be used too.|http://eternal-todo.com/category/bruteforce
xorsearch|1.11.1|Program to search for a given string in an XOR, ROL or ROT encoded binary file.|http://blog.didierstevens.com/programs/xorsearch/
xortool|0.96|A tool to analyze multi-byte xor cipher.|https://github.com/hellman/xortool/