exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 25 of 179 RSS Feed

Files

Hyperion Runtime Encrypter 2.3.1
Posted Mar 28, 2020
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: A bugfix in .net file detection.
tags | tool, encryption
SHA-256 | 546bba6c21a8e53a0ebd1b8665fdb96452b6cab6ffbd9956b7c34f8bdab5e518
Hyperion Runtime Encrypter 2.3
Posted Mar 21, 2020
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Hyperion now rejects unsupported .NET executables, preserves the GUI/Commandline PE flag, has a lower AV detection because static stuff was removed, and 64 bit output file size was reduced by 4 kilo bytes.
tags | tool, encryption
SHA-256 | 2364513b2f75c3dc33a2b0a95b24e345d7dbe8fb2c3717c63cb058613b286779
Hyperion Runtime Encrypter 2.0
Posted Jun 12, 2019
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Support for 64bit was added. C++ has been replaced by a more clean C implementation. More modular concept allows extensions with custom payloads.
tags | tool, encryption
SHA-256 | 4aca3455bf543f257a9dfc1d5a9809a4e42a520b7053074ac940fa74b968bb72
Tinycrypt.asm Training Ransomware Virus
Posted Sep 9, 2016
Authored by Mark Osborne

Tinycrypt.asm is a training ransomware virus that is fully configurable to your needs but it is designed to be very controllable. It was designed to be used with the PoShFoTo incident response toolkit.

tags | tool, encryption, virus
SHA-256 | d69c41d85e494c771d84d2ee2805586148307dc2162ea290443e61ae27b7d432
Hyperion Runtime Encrypter 1.2
Posted Feb 18, 2015
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Added Windows 8/8.1 support.
tags | tool, encryption
SHA-256 | 463693c779a9fe1609ab19cf5871b4c590340ef78f68ac0055a8b97792888187
Codetective 0.8
Posted Sep 7, 2014
Authored by Francisco Gama Tabanez Ribeiro | Site digitalloft.org

Codetective is an analysis tool to determine the crypto/encoding algorithm used according to traces of its representation. It can be used as a standalone version or as a volatility plugin for memory analysis. Written in Python.

Changes: This is close to a complete re-write with new features and many, many bug fixes.
tags | tool, encryption, cryptography, python
SHA-256 | e8c6fbb2179635e443a6922a1aaecdf710d41c49725e5990c39dcc4fc950fbc1
privacyIDEA 1.0
Posted Jun 20, 2014
Authored by Cornelius Kolbel | Site privacyidea.org

privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, and Yubikey. New devices can be added easily. Users can be retrieved from flat files, LDAP, or Active Directory. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionalities.

Changes: Various updates.
tags | tool, encryption
systems | unix
SHA-256 | ce3b1b7ce265e3278f65a70bff53448c5d1500278ca24f6f8622451ac0f87615
CodeCrypt 1.6.1
Posted May 19, 2014
Site github.com

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release adds a minor padding improvement and a possible known-plaintext message authenticity attack fix in symmetric encryption.
tags | tool, encryption
systems | unix
SHA-256 | a320f519e0ebd25390f45bda5d94e3f2fe48019e037411b2c99d807795f9188b
privacyIDEA 0.9
Posted May 13, 2014
Authored by Cornelius Kolbel | Site privacyidea.org

privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, and Yubikey. New devices can be added easily. Users can be retrieved from flat files, LDAP, or Active Directory. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionalities.

tags | tool, encryption
systems | unix
SHA-256 | f6944784beba8386ece7a9621f56b9742b5e17a13432ddf8fd3104c3d102ff17
Hyperion Runtime Encrypter 1.1
Posted May 9, 2014
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Code base has been cleaned up to decrease size and increase maintainability. Furthermore, a new command line allows enabling/disabling of logging and verbose informations. Key space can be reduced too which speeds up the bruteforcing process for larger input files. Next stop will be AV evasion to reduce detection rate.
tags | tool, encryption
SHA-256 | fa0f0dd00142c7e8afb79cd7f2585a81d1ad07048a94db78fb3f1d9234ea8c36
CodeCrypt 1.6
Posted Apr 9, 2014
Site github.com

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release adds lots of new ciphers (made from ChaCha20 and provably-secure XSYND), adds support for symmetric encryption (for large files), removes some obsolete RC4 usage, and adds some convenience features.
tags | tool, encryption
systems | unix
SHA-256 | 3a286297561acfa2c1e993319b1877b862e1a5000ed00727dafee5c81cdb1c45
CodeCrypt 1.5
Posted Mar 11, 2014

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release adds hashfiles and several speed and user interface improvements.
tags | tool, encryption
systems | unix
SHA-256 | 7cf28c306205dac321f792b40c1ace736ae4f0b55acbb56f588a3e2d8d7d57c2
CodeCrypt 1.4.1
Posted Jan 27, 2014

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This userfriendliness release improves management of the keyring, provides better resistance against data loss, and makes compilation on MinGW possible.
tags | tool, encryption
systems | unix
SHA-256 | a3b26bb4d9488bf0569d69db3de57f5109ce64c7900b568fc6da78c4c3fe920f
CodeCrypt 1.4
Posted Oct 2, 2013

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release adds a complete range of Cubehash-based algorithms. Crypto++ dependency is now optional. The KeyID algorithm has been changed, so old ciphertexts/signed messages may be incompatible with this version.
tags | encryption
systems | unix
SHA-256 | eee6b58d11a9fae9a72b635655881b8340d3bf27af3db8035b8ce96953f03074
CryptHook Secure TCP/UDP Connection Wrapper
Posted Sep 18, 2013
Authored by stderr | Site chokepoint.net

CryptHook is a modular implementation for securing and layering cryptography for existing applications with symmetrical block cipher encryption. It works by hooking the base system calls for network communication send/sendto and recv/recvfrom. Crypthook will work with any existing application that relies on these system calls. Full example at their homepage includes tunneling SSH through the encrypted wrapper.

tags | tool, encryption
SHA-256 | fc13d7556b46c8a8c4a1900b3b5fe6de507d49964efdbcce7f930cb720a1523b
CodeCrypt 1.3
Posted Sep 16, 2013

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release fixes too aggressive locking of keyring that caused deadlocks on piping. It fixes many warnings and code inconsistencies. It prevents possible problems with forged sencode.
tags | tool, encryption
systems | unix
SHA-256 | 277dbeecac4cd5fc2e53a30456b96c3020f64e3c1fdc8a01436bdc1e4c9eddc9
Camuflage AES Encryption Shell Script
Posted Jul 12, 2013
Authored by Juan J. Fernandez Lopez

Camuflage is a short shellscript that makes AES encryption/decryption operations with OpenSSL easier.

tags | tool, encryption
SHA-256 | 77a5d5c0b689028319d8a3180931df3bf00aa5038570239dac656b70d7e35de4
Crypthisthing Blowfish Encryption Tool
Posted Jul 8, 2013
Authored by Juan J. Fernandez Lopez | Site tcpapplication.com

This program encrypts and decrypts files using a 128 bit length key with Blowfish in CBC mode.

tags | tool, encryption
SHA-256 | 47e5f1406f19065edce7cda9fd3183d37944e05e7a528e286ee0343714aad83d
CodeCrypt 1.1
Posted May 18, 2013

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: A significant encryption and decryption speedup, and a fix for an erroneous colex unranking function in the Fujisaki-Okamoto padding scheme.
tags | tool, encryption
systems | unix
SHA-256 | 71bc3fbdafb466f68aa85c4f8df39f20f8946b83e5727a2a570355cf33995c71
CodeCrypt 1.0
Posted May 4, 2013
Site github.com

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release has backwards incompatible changes (padding improvements), several fixes, and algorithms for 2^192 security levels.
tags | tool, encryption
systems | unix
SHA-256 | 454f1285ef7c64f58a57b00301e78139f43e45c2d61400b5f8f87535a9b86149
strongSwan IPsec Implementation 5.0.4
Posted May 1, 2013
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Changes: This release fixes a severe security vulnerability (CVE-2013-2944) that existed in all versions 4.3.5 through 5.0.3. If the strongSwan "openssl" plugin was used for ECDSA signature verification, an empty, zeroed, or otherwise invalid signature was handled as a legitimate one.
tags | encryption, protocol
systems | linux, unix, freebsd, apple, osx
advisories | CVE-2013-2949
SHA-256 | f52a048aabc783056f90efab6c181ccb17b17396d3208327b4f90debaa4c16a3
strongSwan IPsec Implementation 5.0.2
Posted Feb 12, 2013
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Changes: The strongSwan Trusted Network Connect functionality supports all IETF Standard PA-TNC attributes and a new OS IMC/IMV pair using these attributes to transfer Linux or Android operating system information. Interoperability with Windows XP has been improved by supporting PKCS#7 certificate containers and legacy NAT traversal protocols. The test framework has been migrated from User Mode Linux to KVM, making it faster and more robust.
tags | tool, encryption, protocol
systems | linux, unix, freebsd, apple, osx
SHA-256 | d46f91e8a8f6bd9102156d1ee6efb61bd15b3a8b8b5c619bc91c1c61474727b6
Entropy Broker RNG 2.1
Posted Dec 22, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release adds a Web interface for viewing usage statistics, per-user bandwidth limits, and many small fixes.
tags | encryption
systems | linux
SHA-256 | a3f390c0f95d70ab5d90a8cb508fd38446170748012ce225225580bd14f4417e
Entropy Broker RNG 2.0.1
Posted Nov 22, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release fixes crashes with the Linux kernel client.
tags | tool, encryption
systems | linux
SHA-256 | 3d1e4c41d08e5baf8af7d5cee22f9eb7fd7ed309f653a29a3211116a0cf24340
Entropy Broker RNG 2.0
Posted Oct 30, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: Entropy broker is now fully multi-threaded so that no client can block the broker, and higher bitrates can now be achieved. The OpenSSL dependency has been replaced by the crypto++ library. A 'configure' script has been added. This release has been checked for software defects with Coverity. The network protocol has been adapted for bigger block sizes. Ciphers/hashes are now fully user selectable. There is reduced broker entropy usage.
tags | tool, encryption
systems | linux
SHA-256 | 39eaa71765d33198222497e34aab245d65b3b844120d11bec809f454b85721ad
Page 1 of 8
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
US Senators Propose Law To Require Bare Minimum Security Standards
Posted Nov 27, 2024

tags | headline, government, usa, password
Telco Engineer Who Spied On Employer For Beijing Gets 4 Years
Posted Nov 27, 2024

tags | headline, government, privacy, usa, phone, china, cyberwar, spyware, voip
New York Fines GEICO And Travelers $11.3 Million In Data Breach Cases
Posted Nov 27, 2024

tags | headline, hacker, government, privacy, usa, data loss
ProjectSend Vulnerability Exploited In The Wild
Posted Nov 27, 2024

tags | headline, hacker, flaw
CyberVolk Analysis Explores Ransomware, Hacktivism Connections
Posted Nov 27, 2024

tags | headline, hacker, malware, russia, cybercrime, cryptography
Russian Cyberspies Hacked Building Across Street From Target For W-Fi Attack
Posted Nov 25, 2024

tags | headline, hacker, government, russia, wireless, spyware
Cyberattacks Cost British Businesses $55 Billion In Past 5 Years
Posted Nov 25, 2024

tags | headline, malware, britain, cybercrime, fraud, cryptography
How The ZX Spectrum Became A 1980s Icon
Posted Nov 25, 2024

tags | headline, science
China Has Pwned Thousands And Thousands Of Telco Devices
Posted Nov 25, 2024

tags | headline, government, privacy, usa, china, cyberwar, spyware
Here's What Happens If You Don't Layer Network Security Or Remove Unused Web Shells
Posted Nov 22, 2024

tags | headline, government, privacy, cybercrime, data loss, japan
View More News →
packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close