1
0
mirror of https://github.com/byReqz/blackmate.git synced 2024-11-01 11:33:13 +00:00
blackmate/categories/crypto
2016-07-02 17:25:11 +00:00

35 lines
4.4 KiB
Plaintext

aespipe|2.4d|Reads data from stdin and outputs encrypted or decrypted results to stdout.|http://loop-aes.sourceforge.net/aespipe/
auto-xor-decryptor|5.1f552be|Automatic XOR decryptor tool.|http://www.blog.mrg-effitas.com/publishing-of-mrg-effitas-automatic-xor-decryptor-tool/
b2sum|57.cb0506c|BLAKE2 file hash sum check. Computes the BLAKE2 (BLAKE2b or -s, -bp, -sp) cryptographic hash of a given file.|https://blake2.net/
bletchley|0.0.1|A collection of practical application cryptanalysis tools.|https://code.google.com/p/bletchley/
ciphertest|20.3224858|A better SSL cipher checker using gnutls.|https://github.com/OpenSecurityResearch/ciphertest
ciphr|105.db79691|A CLI tool for encoding, decoding, encryption, decryption, and hashing streams of data.|https://github.com/frohoff/ciphr
codetective|39.7f44df4|A tool to determine the crypto/encoding algorithm used according to traces of its representation.|https://www.digitalloft.org/init/plugin_wiki/page/codetective
crypthook|17.0728cd1|TCP/UDP symmetric encryption tunnel wrapper.|https://github.com/chokepoint/CryptHook
cryptonark|0.5.6|SSL security checker.|http://blog.techstacks.com/cryptonark.html
findmyhash|1.1.2|Crack different types of hashes using free online services|http://code.google.com/p/findmyhash/
gnutls2|2.12.23|A library which provides a secure layer over a reliable transport layer (Version 2)|http://gnutls.org/
hashfind|8.e9a9a14|A tool to search files for matching password hash types and other interesting data.|https://github.com/rurapenthe/hashfind
hashid|397.7e8473a|Software to identify the different types of hashes used to encrypt data.|https://github.com/psypanda/hashID
hashpump|45.2d01d3b|A tool to exploit the hash length extension attack in various hashing algorithms.|https://github.com/bwall/HashPump
hdcp-genkey|18.e8d342d|Generate HDCP source and sink keys from the leaked master key.|https://github.com/rjw57/hdcp-genkey
kraken|32.368a837|A project to encrypt A5/1 GSM signaling using a Time/Memory Tradeoff Attack.|http://opensource.srlabs.de/projects/a51-decrypt
luksipc|0.01|A tool to convert unencrypted block devices to encrypted LUKS devices in-place.|http://www.johannes-bauer.com/linux/luksipc
morxkeyfmt|1.0|Read a private key from stdin and output formatted data values.|http://www.morxploit.com/tools/
nomorexor|0.1|Tool to help guess a files 256 byte XOR key by using frequency analysis|https://github.com/hiddenillusion/NoMoreXOR
openstego|0.6.1|A tool implemented in Java for generic steganography, with support for password-based encryption of the data.|http://www.openstego.info/
outguess|0.2|A universal steganographic tool.|http://www.outguess.org/
pacumen|1.92a0884|Packet Acumen - Analyse encrypted network traffic and more (side-channel attacks).|https://github.com/bniemczyk/pacumen
pip3line|80.2e926b0|The Swiss army knife of byte manipulation.|https://github.com/nccgroup/pip3line
posttester|0.1|A jar file that will send POST requests to servers in order to test for the hash collision vulnerability discussed at the Chaos Communication Congress in Berlin.|http://packetstormsecurity.com/files/109010/MagicHash-Collision-Testing-Tool.html
pwd-hash|2.0|A password hashing tool that use the crypt function to generate the hash of a string given on standard input.|http://vladz.devzero.fr/pwd-hash.php
sbd|1.36|Netcat-clone, portable, offers strong encryption - features AES-CBC + HMAC-SHA1 encryption, program execution (-e), choosing source port, continuous reconnection with delay + more|http://www2.packetstormsecurity.org/cgi-bin/search/search.cgi?searchvalue=sbd
snow|20130616|Steganography program for concealing messages in text files.|http://darkside.com.au/snow/index.html
testssl|2.6|Testing TLS/SSL encryption.|https://github.com/drwetter/testssl.sh
tlsenum|77.b60e2c8|A command line tool to enumerate TLS cipher-suites supported by a server.|https://github.com/Ayrx/tlsenum
tlspretense|0.6.2|SSL/TLS client testing framework|https://github.com/iSECPartners/tlspretense
veracrypt|1.17|Disk encryption with strong security based on TrueCrypt|http://veracrypt.codeplex.com/
xorbruteforcer|0.1|Script that implements a XOR bruteforcing of a given file, although a specific key can be used too.|http://eternal-todo.com/category/bruteforce
xorsearch|1.11.1|Program to search for a given string in an XOR, ROL or ROT encoded binary file.|http://blog.didierstevens.com/programs/xorsearch/
xortool|0.96|A tool to analyze multi-byte xor cipher.|https://github.com/hellman/xortool/