Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
546bba6c21a8e53a0ebd1b8665fdb96452b6cab6ffbd9956b7c34f8bdab5e518
Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
2364513b2f75c3dc33a2b0a95b24e345d7dbe8fb2c3717c63cb058613b286779
Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
4aca3455bf543f257a9dfc1d5a9809a4e42a520b7053074ac940fa74b968bb72
Tinycrypt.asm is a training ransomware virus that is fully configurable to your needs but it is designed to be very controllable. It was designed to be used with the PoShFoTo incident response toolkit.
d69c41d85e494c771d84d2ee2805586148307dc2162ea290443e61ae27b7d432
Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
463693c779a9fe1609ab19cf5871b4c590340ef78f68ac0055a8b97792888187
Codetective is an analysis tool to determine the crypto/encoding algorithm used according to traces of its representation. It can be used as a standalone version or as a volatility plugin for memory analysis. Written in Python.
e8c6fbb2179635e443a6922a1aaecdf710d41c49725e5990c39dcc4fc950fbc1
privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, and Yubikey. New devices can be added easily. Users can be retrieved from flat files, LDAP, or Active Directory. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionalities.
ce3b1b7ce265e3278f65a70bff53448c5d1500278ca24f6f8622451ac0f87615
codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
a320f519e0ebd25390f45bda5d94e3f2fe48019e037411b2c99d807795f9188b
privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, and Yubikey. New devices can be added easily. Users can be retrieved from flat files, LDAP, or Active Directory. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionalities.
f6944784beba8386ece7a9621f56b9742b5e17a13432ddf8fd3104c3d102ff17
Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".
fa0f0dd00142c7e8afb79cd7f2585a81d1ad07048a94db78fb3f1d9234ea8c36
codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
3a286297561acfa2c1e993319b1877b862e1a5000ed00727dafee5c81cdb1c45
codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
7cf28c306205dac321f792b40c1ace736ae4f0b55acbb56f588a3e2d8d7d57c2
codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
a3b26bb4d9488bf0569d69db3de57f5109ce64c7900b568fc6da78c4c3fe920f
codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
eee6b58d11a9fae9a72b635655881b8340d3bf27af3db8035b8ce96953f03074
CryptHook is a modular implementation for securing and layering cryptography for existing applications with symmetrical block cipher encryption. It works by hooking the base system calls for network communication send/sendto and recv/recvfrom. Crypthook will work with any existing application that relies on these system calls. Full example at their homepage includes tunneling SSH through the encrypted wrapper.
fc13d7556b46c8a8c4a1900b3b5fe6de507d49964efdbcce7f930cb720a1523b
codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
277dbeecac4cd5fc2e53a30456b96c3020f64e3c1fdc8a01436bdc1e4c9eddc9
Camuflage is a short shellscript that makes AES encryption/decryption operations with OpenSSL easier.
77a5d5c0b689028319d8a3180931df3bf00aa5038570239dac656b70d7e35de4
This program encrypts and decrypts files using a 128 bit length key with Blowfish in CBC mode.
47e5f1406f19065edce7cda9fd3183d37944e05e7a528e286ee0343714aad83d
codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
71bc3fbdafb466f68aa85c4f8df39f20f8946b83e5727a2a570355cf33995c71
codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.
454f1285ef7c64f58a57b00301e78139f43e45c2d61400b5f8f87535a9b86149
strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.
f52a048aabc783056f90efab6c181ccb17b17396d3208327b4f90debaa4c16a3
strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.
d46f91e8a8f6bd9102156d1ee6efb61bd15b3a8b8b5c619bc91c1c61474727b6
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
a3f390c0f95d70ab5d90a8cb508fd38446170748012ce225225580bd14f4417e
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
3d1e4c41d08e5baf8af7d5cee22f9eb7fd7ed309f653a29a3211116a0cf24340
Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.
39eaa71765d33198222497e34aab245d65b3b844120d11bec809f454b85721ad