all things security
Showing 1 - 25 of 176 RSS Feed

Files

Tinycrypt.asm Training Ransomware Virus
Posted Sep 9, 2016
Authored by Mark Osborne

Tinycrypt.asm is a training ransomware virus that is fully configurable to your needs but it is designed to be very controllable. It was designed to be used with the PoShFoTo incident response toolkit.

tags | tool, encryption, virus
MD5 | a5016fbb0f4cdb133455314676ba8c4a
Hyperion Runtime Encrypter 1.2
Posted Feb 18, 2015
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Added Windows 8/8.1 support.
tags | tool, encryption
MD5 | dc31d022b124dc92e7c362a62e64bd46
Codetective 0.8
Posted Sep 7, 2014
Authored by Francisco Gama Tabanez Ribeiro | Site digitalloft.org

Codetective is an analysis tool to determine the crypto/encoding algorithm used according to traces of its representation. It can be used as a standalone version or as a volatility plugin for memory analysis. Written in Python.

Changes: This is close to a complete re-write with new features and many, many bug fixes.
tags | tool, encryption, crypto, python
MD5 | b5c964833d9b574ecf7f6ba92d44049d
privacyIDEA 1.0
Posted Jun 20, 2014
Authored by Cornelius Kolbel | Site privacyidea.org

privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, and Yubikey. New devices can be added easily. Users can be retrieved from flat files, LDAP, or Active Directory. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionalities.

Changes: Various updates.
tags | tool, encryption
systems | unix
MD5 | cfb0e9cfc3d0a14881cd80e11c1d7a1d
CodeCrypt 1.6.1
Posted May 19, 2014
Site github.com

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release adds a minor padding improvement and a possible known-plaintext message authenticity attack fix in symmetric encryption.
tags | tool, encryption
systems | unix
MD5 | 73597df11288c19203948228e5a67fdc
privacyIDEA 0.9
Posted May 13, 2014
Authored by Cornelius Kolbel | Site privacyidea.org

privacyIDEA is a multi-factor authentication solution. It can manage any type of authentication device. All common OTP (one time password) devices are supported, including Google Authenticator, eToken Pass, OTP cards, and Yubikey. New devices can be added easily. Users can be retrieved from flat files, LDAP, or Active Directory. It can also handle authorization and writes all events to a digitally signed audit log, giving you basic AAA functionalities.

tags | tool, encryption
systems | unix
MD5 | 3ee9f8b2d62eb146a21b3331bc0419f2
Hyperion Runtime Encrypter 1.1
Posted May 9, 2014
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Code base has been cleaned up to decrease size and increase maintainability. Furthermore, a new command line allows enabling/disabling of logging and verbose informations. Key space can be reduced too which speeds up the bruteforcing process for larger input files. Next stop will be AV evasion to reduce detection rate.
tags | tool, encryption
MD5 | 5693431bbf88b85140f2adabb7ae5e34
CodeCrypt 1.6
Posted Apr 9, 2014
Site github.com

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release adds lots of new ciphers (made from ChaCha20 and provably-secure XSYND), adds support for symmetric encryption (for large files), removes some obsolete RC4 usage, and adds some convenience features.
tags | tool, encryption
systems | unix
MD5 | 1711502b19db59d530f7ed5788734408
CodeCrypt 1.5
Posted Mar 11, 2014

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release adds hashfiles and several speed and user interface improvements.
tags | tool, encryption
systems | unix
MD5 | e42dade5899760c55481eb4576e3856c
CodeCrypt 1.4.1
Posted Jan 27, 2014

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This userfriendliness release improves management of the keyring, provides better resistance against data loss, and makes compilation on MinGW possible.
tags | tool, encryption
systems | unix
MD5 | b04b707402e972f9ffdace7922f7aaaf
CodeCrypt 1.4
Posted Oct 2, 2013

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release adds a complete range of Cubehash-based algorithms. Crypto++ dependency is now optional. The KeyID algorithm has been changed, so old ciphertexts/signed messages may be incompatible with this version.
tags | encryption
systems | unix
MD5 | c484c24beccd33c20fc912149ffe08ad
CryptHook Secure TCP/UDP Connection Wrapper
Posted Sep 18, 2013
Authored by stderr | Site chokepoint.net

CryptHook is a modular implementation for securing and layering cryptography for existing applications with symmetrical block cipher encryption. It works by hooking the base system calls for network communication send/sendto and recv/recvfrom. Crypthook will work with any existing application that relies on these system calls. Full example at their homepage includes tunneling SSH through the encrypted wrapper.

tags | tool, encryption
MD5 | e8904aad71b96b7d4e9d996c4c1e67f0
CodeCrypt 1.3
Posted Sep 16, 2013

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release fixes too aggressive locking of keyring that caused deadlocks on piping. It fixes many warnings and code inconsistencies. It prevents possible problems with forged sencode.
tags | tool, encryption
systems | unix
MD5 | 47c9c951f6d697793fe3472f2a44167c
Camuflage AES Encryption Shell Script
Posted Jul 12, 2013
Authored by Juan J. Fernandez Lopez

Camuflage is a short shellscript that makes AES encryption/decryption operations with OpenSSL easier.

tags | tool, encryption
MD5 | 963ea922122fddc212598046bacc3c60
Crypthisthing Blowfish Encryption Tool
Posted Jul 8, 2013
Authored by Juan J. Fernandez Lopez | Site tcpapplication.com

This program encrypts and decrypts files using a 128 bit length key with Blowfish in CBC mode.

tags | tool, encryption
MD5 | 1ac3042c7cec46bbf7a4d7cfe0ed7f1e
CodeCrypt 1.1
Posted May 18, 2013

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: A significant encryption and decryption speedup, and a fix for an erroneous colex unranking function in the Fujisaki-Okamoto padding scheme.
tags | tool, encryption
systems | unix
MD5 | 311aeba1bf93afa0337fcb693db96e8f
CodeCrypt 1.0
Posted May 4, 2013
Site github.com

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release has backwards incompatible changes (padding improvements), several fixes, and algorithms for 2^192 security levels.
tags | tool, encryption
systems | unix
MD5 | e5298e297df702055fe85c728e0eb917
strongSwan IPsec Implementation 5.0.4
Posted May 1, 2013
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Changes: This release fixes a severe security vulnerability (CVE-2013-2944) that existed in all versions 4.3.5 through 5.0.3. If the strongSwan "openssl" plugin was used for ECDSA signature verification, an empty, zeroed, or otherwise invalid signature was handled as a legitimate one.
tags | encryption, protocol
systems | linux, unix, freebsd, apple, osx
advisories | CVE-2013-2949
MD5 | 7085ac1d28dcc250096553fa51c3a4ea
strongSwan IPsec Implementation 5.0.2
Posted Feb 12, 2013
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Changes: The strongSwan Trusted Network Connect functionality supports all IETF Standard PA-TNC attributes and a new OS IMC/IMV pair using these attributes to transfer Linux or Android operating system information. Interoperability with Windows XP has been improved by supporting PKCS#7 certificate containers and legacy NAT traversal protocols. The test framework has been migrated from User Mode Linux to KVM, making it faster and more robust.
tags | tool, encryption, protocol
systems | linux, unix, freebsd, apple, osx
MD5 | dc05e22ebe3b6668ef38736799d226c8
Entropy Broker RNG 2.1
Posted Dec 22, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release adds a Web interface for viewing usage statistics, per-user bandwidth limits, and many small fixes.
tags | encryption
systems | linux
MD5 | db1ea8c8a742391f553616ceee3435d6
Entropy Broker RNG 2.0.1
Posted Nov 22, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release fixes crashes with the Linux kernel client.
tags | tool, encryption
systems | linux
MD5 | 75fff2e094d150d29d86deaa15782fab
Entropy Broker RNG 2.0
Posted Oct 30, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: Entropy broker is now fully multi-threaded so that no client can block the broker, and higher bitrates can now be achieved. The OpenSSL dependency has been replaced by the crypto++ library. A 'configure' script has been added. This release has been checked for software defects with Coverity. The network protocol has been adapted for bigger block sizes. Ciphers/hashes are now fully user selectable. There is reduced broker entropy usage.
tags | tool, encryption
systems | linux
MD5 | 87e3bde461e6dafa8fee692541955cb9
ccrypt 1.10
Posted Oct 19, 2012
Authored by Peter Selinger | Site ccrypt.sourceforge.net

ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.

Changes: This release fixes a number of minor portability issues and minor bugs, factors ccrypt core functionality into a convenience library (libccrypt.a), adds a ccguess program to assist in the recovery of mistyped keys, improves error checking and fixes minor compiler warnings, adds minor improvements to Emacs support, and adds a --disable-emacs configuration option.
tags | tool, encryption
systems | unix
MD5 | 44ddd763465c254df83f5d38851d04d7
strongSwan IPsec Implementation 5.0.1
Posted Oct 5, 2012
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Changes: The leftsourceip option now accepts a comma separated combination of %config4, %config6, or fixed IP addresses to request from the responder. Likewise, the rightsourceip option accepts multiple explicitly specified or referenced named address pools. TPM-based remote attestation has been extended to verify the complete measurements done by the Linux Integrity Measurement Architecture (IMA). Reference hash values of up to 10'000 Linux system files are stored in an SQLite database.
tags | tool, encryption, protocol
systems | linux, freebsd, apple, osx
MD5 | 950228bfb2972b76af4e65e2071d0417
Entropy Broker RNG 1.2
Posted Sep 18, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release has full IPv6 support, has bps output fixes, can now retrieve entropy data from smart cards, and has support for multiple broker servers. EGD server/client now supports TCP as well (for better compatibility with EntropyKey). There are fixes for Fedora and Coverity warning fixes.
tags | encryption
systems | linux
MD5 | 3b28e4bb24529bf31687b2e60a685b94
Page 1 of 8
Back12345Next

Top Authors In Last 30 Days

Recent News

News RSS Feed
Phishers Getting Smarter By Making Use Of User Location
Posted Oct 20, 2017

tags | headline, malware, cybercrime, fraud, phish
OSX Malware Spread Via Compromised Software Downloads
Posted Oct 20, 2017

tags | headline, malware, apple
Canadian Spooks Release Their Own Malware Detection Tool
Posted Oct 20, 2017

tags | headline, government, malware, canada, spyware
Judge: MalwareTech Is No Longer Under Curfew, GPS Monitoring
Posted Oct 20, 2017

tags | headline, hacker, government, malware, usa, conference
Microsoft Mocks Google For Failed Security Fix Deployment Methodology
Posted Oct 19, 2017

tags | headline, microsoft, flaw, google, chrome
Malicious Mineraft Apps In Google Play Enslave Your Device To A Botnet
Posted Oct 19, 2017

tags | headline, malware, microsoft, phone, botnet, google
OAIC Received 114 Voluntary Data Breach Notifications In Two Years
Posted Oct 19, 2017

tags | headline, hacker, privacy, australia, data loss
US-CERT Predicts Machine Learning To Become Security Risk
Posted Oct 19, 2017

tags | headline, flaw
ATM Malware Available Online For Online $5,000
Posted Oct 18, 2017

tags | headline, malware, bank, cybercrime, fraud
Oracle Swats 252 Bugs In Patch Update
Posted Oct 18, 2017

tags | headline, flaw, patch, oracle
View More News →
packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close