exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 101 - 125 of 2,383 RSS Feed

Encryption Files

OpenSSL Toolkit 1.1.1e
Posted Mar 18, 2020
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: It now properly detects EOF while reading in libssl. Fixed SSL_get_servername() behaviour. Various other updates and bug fixes.
tags | tool, encryption, protocol
systems | unix
SHA-256 | 694f61ac11cb51c9bf73f54e771ff6022b0327a43bbdfa1b2f19de1662a6dcbe
OpenSSH 8.2p1
Posted Feb 17, 2020
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: SSHFP is now an RFC. Various other bug fixes and updates.
tags | tool, encryption
systems | linux, unix, openbsd
SHA-256 | 43925151e6cf6cee1450190c0e9af4dc36b41c12737619edff8bcebdff64e671
Stegano 0.9.8
Posted Dec 20, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Stegano is now using poetry. Minor improvements to the command line.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 1be08a9fa0e4420e7fbf7a6e4dc82ff60fe268cf858651939df92c55faf58cda
GNU Privacy Guard 2.2.19
Posted Dec 9, 2019
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Fixed double free when decrypting for hidden recipients. Now uses auto-key-locate for encryption even for mail addressed given with angle brackets. Add special case for certain expired intermediate certificates with gpgsm.
tags | tool, encryption
SHA-256 | 242554c0e06f3a83c420b052f750b65ead711cc3fddddb5e7274fcdbb4e9dec0
GNU Privacy Guard 2.2.18
Posted Nov 26, 2019
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Adjusted tests for now invalid SHA-1 key signatures. Improved --debug-pinentry diagnostics in agent.
tags | tool, encryption
SHA-256 | 30d37ce2ca55b2b9b61480b2a175a3b22066ab41cd3f84688448919b566dec0a
cryptmount Filesystem Manager 5.3.2
Posted Nov 18, 2019
Authored by RW Penney | Site cryptmount.sourceforge.net

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

Changes: Refined handling of passwords in mudslinger testing script.
tags | tool, kernel, encryption
systems | linux, unix
SHA-256 | 0184f416bfa0798a5f633bf4c5fa22a6c699089323d8f1918e18463d16bda3b5
Stegano 0.9.7
Posted Oct 28, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Fixed markdown of the previous release.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 815698777c2f3f079d972fabf9f944194febb1efa769ea2a8940dd41d5d1667f
OpenSSH 8.1p1
Posted Oct 9, 2019
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: An exploitable integer overflow bug was found in the private key parsing code for the XMSS key type and addressed. Added protection for private keys at rest in RAM against speculation and memory side-channel attacks like Spectre, Meltdown and Rambleed. Various other bug fixes and updates.
tags | tool, encryption
systems | linux, unix, openbsd
SHA-256 | 02f5dbef3835d0753556f973cd57b4c19b6b1f6cd24c03445e23ac77ca1b93ff
OpenSSL Toolkit 1.1.1d
Posted Sep 11, 2019
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Fixed a fork protection issue. Added a bypass mitigation. Various other updates.
tags | tool, encryption, protocol
systems | unix
advisories | CVE-2019-1547, CVE-2019-1549, CVE-2019-1552, CVE-2019-1563
SHA-256 | 1e3a91bc1f9dfce01af26026f856e064eab4c8ee0a8f457b5ae30b40b8b711f2
SSLsplit 0.5.5
Posted Aug 30, 2019
Site roe.ch

SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.

Changes: Added -A option for specifying a default leaf certificate instead of generating it on the fly. Increased the default RSA leaf key size to 2048 bits and force an OpenSSL security level of 0 in order to maximize interoperability in the default configuration. Various other bug fixes and updates.
tags | tool, encryption
SHA-256 | ba0473fd01428439e0cf22fae80fdd26d08a0bcf85e17c82177cb0810b700faf
Tinc Virtual Private Network Daemon 1.0.36
Posted Aug 26, 2019
Authored by Ivo Timmermans | Site tinc.nl.linux.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: Fixed compiling tinc with certain versions of the OpenSSL library. Fixed parsing some IPv6 addresses with :: in them. Fixed GraphDumpFile output to handle node names starting with a digit. Fixed a potential segmentation fault when fragmenting packets.
tags | tool, encryption
systems | unix
SHA-256 | 40f73bb3facc480effe0e771442a706ff0488edea7a5f2505d4ccb2aa8163108
GNU Privacy Guard 2.2.17
Posted Jul 13, 2019
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes.
tags | tool, encryption
SHA-256 | afa262868e39b651a2db4c071fba90415154243e83a830ca00516f9a807fd514
Hyperion Runtime Encrypter 2.0
Posted Jun 12, 2019
Authored by belial | Site nullsecurity.net

Hyperion is a runtime encrypter for 32-bit and 64-bit portable executables. It is a reference implementation and bases on the paper "Hyperion: Implementation of a PE-Crypter".

Changes: Support for 64bit was added. C++ has been replaced by a more clean C implementation. More modular concept allows extensions with custom payloads.
tags | tool, encryption
SHA-256 | 4aca3455bf543f257a9dfc1d5a9809a4e42a520b7053074ac940fa74b968bb72
Stegano 0.9.4
Posted Jun 5, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Implemented LFSR generator. Implemented Ackermann generators CLI interface. Various other updates.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 3747781ba4e75e37e24dfb71fc8de21c16ab1136f2475e7a942a23d49e1d573e
GNU Privacy Guard 2.2.16
Posted May 28, 2019
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes.
tags | tool, encryption
SHA-256 | 6cbe8d454bf5dc204621eed3016d721b66298fa95363395bb8eeceb1d2fd14cb
OpenSSL Toolkit 1.1.1c
Posted May 28, 2019
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Added build tests for C++. Enabled SHA3 pre-hashing for ECDSA and DSA. Various other updates.
tags | tool, encryption, protocol
systems | unix
SHA-256 | f6fb3079ad15076154eda9413fed42877d668e7069d9b87396d0804fdb3f4c90
OpenSSH 8.0p1
Posted Apr 18, 2019
Authored by Damien Miller | Site openssh.com

This is a Linux/portable port of OpenBSD's excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen's SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Changes: Various bug fixes and updates.
tags | tool, encryption
systems | linux, unix, openbsd
SHA-256 | bd943879e69498e8031eb6b7f44d08cdc37d59a7ab689aa0b437320c3481fd68
Stegano 0.9.3
Posted Apr 10, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: It is now possible to either pass the location of an image or directly pass an already opened Image.Image to the hide and reveal methods. Code has been re-formatted a bit with black.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 02d50fafa7afa15affc9d2a910ba52a7906c1a7771884976926c3e1e9b326884
Stegano 0.9.2
Posted Apr 4, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Updated Pillow dependency to version 6.0.0 in order to fix a bug when opening some PNG files.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 491a7ed475f73b7cb958fd34d9c11a860a0158979d89768b93c42308a5c44892
GNU Privacy Guard 2.2.15
Posted Mar 26, 2019
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes. New commands --print-wkd-hash and --print-wkd-url for gpg-wks-client.
tags | tool, encryption
SHA-256 | cb8ce298d7b36558ffc48aec961b14c830ff1783eef7a623411188b5e0f5d454
GNU Privacy Guard 2.2.14
Posted Mar 19, 2019
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple code updates and an updated Russian translation.
tags | tool, encryption
SHA-256 | 1bf9ed46dc1ec5d8cfa13ba1ad47f94981f3b6a7ec16ad9123cc2549c4cbf87b
Stegano 0.9.1
Posted Mar 7, 2019
Authored by Cedric Bonhomme | Site github.com

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

Changes: Updated Pillow dependency in order to fix a bug when opening some PNG files.
tags | tool, encryption, steganography, python
systems | unix
SHA-256 | 9fa2e8c51d173c74b0305f4f1e2a2d995755c22d2da0261c82f4f2a3f2185b6a
OpenSSL Toolkit 1.1.1b
Posted Feb 28, 2019
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: Added SCA hardening for modular field inversion in EC_GROUP through a new dedicated field_inv() pointer in EC_METHOD. Changed the info callback signals for the start and end of a post-handshake message exchange in TLSv1.3. Various other updates.
tags | tool, encryption, protocol
systems | unix
SHA-256 | 5c557b023230413dfb0756f3137a13e6d726838ccd1430888ad15bfb2b43ea4b
GNU Privacy Guard 2.2.13
Posted Feb 13, 2019
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes and code improvements added.
tags | tool, encryption
SHA-256 | 76c787a955f9e6e0ead47c9be700bfb9d454f955a7b7c7e697aa719bac7b11d8
cryptmount Filesystem Manager 5.3.1
Posted Jan 7, 2019
Authored by RW Penney | Site cryptmount.sourceforge.net

cryptmount is a utility for creating and managing secure filing systems on GNU/Linux systems. After initial setup, it allows any user to mount or unmount filesystems on demand, solely by providing the decryption password, with any system devices needed to access the filing system being configured automatically. A wide variety of encryption schemes (provided by the kernel dm-crypt system and the libgcrypt library) can be used to protect both the filesystem and the access key. The protected filing systems can reside in either ordinary files or disk partitions. The package also supports encrypted swap partitions, and automatic configuration on system boot-up.

Changes: Fixed memory cleanup error on closedown when using multiple targets. Fixed memory cleanup error on closedown when using multiple targets.
tags | tool, kernel, encryption
systems | linux, unix
SHA-256 | c531aa2286bbd194b71f103fb411c4821083317c0d1f2b700382328a57e99631
Page 5 of 96
Back34567Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close