Exploit the possiblities
Showing 101 - 125 of 2,222 RSS Feed

Encryption Files

SSLsplit 0.4.7
Posted Jul 3, 2013
Site roe.ch

SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.

Changes: This release prevents IETF draft public key pinning by removing HPKP headers from responses. Also, remaining threading issues in daemon mode are fixed, and the connection log now contains the HTTP status code and the size of the response.
tags | encryption
MD5 | 7a1d2931c78736c006ee34dfb6be4a75
SSLsplit 0.4.6
Posted Jun 4, 2013
Site roe.ch

SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.

Changes: This bugfix release fixes a bug in passthrough mode (-P) when no matching certificate is found for a connection (issue 9) and a bug in binding to ports less than 1024 with default settings (issue 8). Additionally, it works around a bug in OpenSSL 1.0.0k and 1.0.1e which caused a segmentation fault when loading certificates or keys.
tags | encryption
MD5 | 60612a7068dcddedafc6b0adc83f0c0b
GNU Privacy Guard 2.0.28
Posted Jun 2, 2013

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: Multiple bug fixes.
tags | encryption
MD5 | d5cbb97673b99ca234507b74bfe8a29e
CodeCrypt 1.1
Posted May 18, 2013

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: A significant encryption and decryption speedup, and a fix for an erroneous colex unranking function in the Fujisaki-Okamoto padding scheme.
tags | tool, encryption
systems | unix
MD5 | 311aeba1bf93afa0337fcb693db96e8f
CodeCrypt 1.0
Posted May 4, 2013
Site github.com

codecrypt is a GnuPG-like program for encryption and signing that uses only quantum-computer-resistant algorithms.

Changes: This release has backwards incompatible changes (padding improvements), several fixes, and algorithms for 2^192 security levels.
tags | tool, encryption
systems | unix
MD5 | e5298e297df702055fe85c728e0eb917
HElib Homomorphic Encryption Library Commit 4548d85572
Posted May 3, 2013
Authored by IBM | Site github.com

HElib is a software library that implements homomorphic encryption (HE). Currently available is an implementation of the Brakerski-Gentry-Vaikuntanathan (BGV) scheme, along with many optimizations to make homomorphic evaluations run faster, focusing mostly on effective use of the Smart-Vercauteren ciphertext packing techniques and the Gentry-Halevi-Smart optimizations. This library is written in C++ and uses the NTL mathematical library. It is distributed under the terms of the GNU General Public License (GPL).

tags | encryption, crypto, library
MD5 | b48ff50ae58488b21c82232277f3ba5a
strongSwan IPsec Implementation 5.0.4
Posted May 1, 2013
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Changes: This release fixes a severe security vulnerability (CVE-2013-2944) that existed in all versions 4.3.5 through 5.0.3. If the strongSwan "openssl" plugin was used for ECDSA signature verification, an empty, zeroed, or otherwise invalid signature was handled as a legitimate one.
tags | encryption, protocol
systems | linux, unix, freebsd, apple, osx
advisories | CVE-2013-2949
MD5 | 7085ac1d28dcc250096553fa51c3a4ea
Tinc Virtual Private Network Daemon 1.0.21
Posted Apr 22, 2013
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: This release lets tinc drop packets that are forwarded via TCP if they are too big.
tags | tool, encryption
systems | unix
advisories | CVE-2013-1428
MD5 | d7bc9ca38672c9da08d74ff2a3e8e36d
PGP Individual UID Signer 2.0.10
Posted Mar 30, 2013
Authored by Phil Dibowitz | Site phildev.net

PGP Individual UID Signer makes signing all the UIDs on all of the keys at a PGP keysigning party much simpler. It prompts for verification fingerprints, and then signs each UID on each key separately and emails them to their recipients encrypted with PGP/MIME.

Changes: A variety of of bugfixes and changes to several default preferences to make it easier to use. This release is compatible with GnuPG2. All users are encouraged to upgrade.
tags | tool, encryption
MD5 | cd0a69df6cdf145191ca67906e6b0914
OpenSSL-Based Signcode Utility 1.5.1
Posted Mar 12, 2013
Authored by mfive | Site sourceforge.net

OpenSSL-based signcode utility is used for Authenticode signing of EXE/CAB files. It also supports timestamping.

Changes: This release added support for signing MSI files. The correct PE checksum is now calculated instead of setting it to 0. Support for RFC3161 timestamping was added (-ts option) along with support for extracting, removing, and verifying signatures of PE files. A problem with not being able to decode timestamps with no newlines was fixed. Support for reading keys from PVK files was added (requires OpenSSL 1.0.0 or later). Certificates can now be read from PEM files. The -spc option was renamed to -certs (the old option name is still valid).
tags | tool, encryption
systems | unix
MD5 | d86cdc02bb060a4cc924c2f000c84999
Tinc Virtual Private Network Daemon 1.0.20
Posted Mar 4, 2013
Authored by Ivo Timmermans | Site tinc-vpn.org

tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.

Changes: This release improves the default device selection on FreeBSD and NetBSD when using switch mode. PMTU discovery is now also applied to VLAN-tagged traffic. The LocalDiscovery option now makes use of all addresses tinc is bound to. The PriorityInheritance option now also works with switch mode. A crash when using a SOCKS5 proxy has been fixed. There are minor improvements and clarifications in the documentation, support for tunemu on iOS devices is fixed, and tinc can now be cross-compiled with Android's NDK.
tags | tool, encryption
systems | unix
MD5 | 001277e0ccd7ca29f7fa4039774ad611
Windtalking Computers: Frequency Normalization, Binary Coding Systems, and Encryption
Posted Mar 3, 2013
Authored by Givon Zirkind | Site givonzirkind.weebly.com

The goal of this paper is to discuss the application of known techniques, knowledge and technology in a novel way, to encrypt computer and non-computer data. There are two distinct and separate methods presented in this paper.

tags | paper, encryption, crypto
MD5 | 6f6af8933f56904417513cdb83cbb907
strongSwan IPsec Implementation 5.0.2
Posted Feb 12, 2013
Authored by Andreas Steffen | Site strongswan.org

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface. A rich choice of modular plugins adds additional features like Trusted Network Connect or advanced cryptographical algorithms.

Changes: The strongSwan Trusted Network Connect functionality supports all IETF Standard PA-TNC attributes and a new OS IMC/IMV pair using these attributes to transfer Linux or Android operating system information. Interoperability with Windows XP has been improved by supporting PKCS#7 certificate containers and legacy NAT traversal protocols. The test framework has been migrated from User Mode Linux to KVM, making it faster and more robust.
tags | tool, encryption, protocol
systems | linux, unix, freebsd, apple, osx
MD5 | dc05e22ebe3b6668ef38736799d226c8
OpenSSL Toolkit 1.0.1d
Posted Feb 8, 2013
Site openssl.org

OpenSSL is a robust, fully featured Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) protocols with full-strength cryptography world-wide.

Changes: A weakness in the handling of CBC ciphersuites in SSL, TLS, and DTLS, exploited through timing differences arising during MAC processing, was fixed. This vulnerability was reported as CVE-2013-0169. A flaw in the handling of CBC ciphersuites in TLS 1.1 and TLS 1.2 on AES-NI supporting platforms was fixed. This vulnerability was reported as CVE-2012-2686. A flaw in the handling of OCSP response verification, exploitable with a denial of service attack, was fixed. This vulnerability was reported as CVE-2013-0166.
tags | tool, encryption, protocol
systems | unix
MD5 | b92fc634f0f1f31a67ed4175adc5ba33
OpenNHRP NBMA Next Hop Resolution 0.14.1
Posted Feb 8, 2013
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: This release fixes handling of multicast packets by not sending useless traffic indications about them. It also fixes recovery from DNS lookup failure of dynamic-map bindings.
tags | encryption, protocol
systems | cisco, linux
MD5 | eb42ddb13e07ceb415b9ebb8eaca28ee
GNU Privacy Guard 1.4.13
Posted Jan 8, 2013
Site gnupg.org

GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.

Changes: A corruption of the public keyring database on import of manipulated public keys was fixed. This issue was reported as CVE-2012-6085. Support for the old cipher algorithm IDEA was added. Small changes were made to increase compatibility with future OpenPGP and GnuPG features. Minor bugfixes were made.
tags | tool, encryption
advisories | CVE-2012-6085
MD5 | 33cd35779625310de122d07fc77be2cb
Stegano 0.4
Posted Dec 29, 2012
Authored by Cedric Bonhomme | Site bitbucket.org

Stegano is a basic Python Steganography module. Stegano implements two methods of hiding: using the red portion of a pixel to hide ASCII messages, and using the Least Significant Bit (LSB) technique. It is possible to use a more advanced LSB method based on integers sets. The sets (Sieve of Eratosthenes, Fermat, Carmichael numbers, etc.) are used to select the pixels used to hide the information.

tags | tool, encryption, steganography, python
MD5 | a4f5c723e1f005e25b10aad01ee5c3f2
Entropy Broker RNG 2.1
Posted Dec 22, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release adds a Web interface for viewing usage statistics, per-user bandwidth limits, and many small fixes.
tags | encryption
systems | linux
MD5 | db1ea8c8a742391f553616ceee3435d6
OpenNHRP NBMA Next Hop Resolution 0.14
Posted Dec 13, 2012
Authored by Timo Teras | Site sourceforge.net

OpenNHRP implements the NBMA Next Hop Resolution Protocol (as defined in RFC 2332). It makes it possible to create a dynamic multipoint VPN Linux router using NHRP, GRE, and IPsec. It aims to be Cisco DMVPN compatible.

Changes: The license has changed to MIT. This release adds minor bugfixes to handle network configuration errors properly (e.g., protocol address routing loops and very low holding times).
tags | tool, encryption, protocol
systems | cisco, linux
MD5 | 62e8f16dd3bdf0600e43fcb37aa40462
Entropy Broker RNG 2.0.1
Posted Nov 22, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: This release fixes crashes with the Linux kernel client.
tags | tool, encryption
systems | linux
MD5 | 75fff2e094d150d29d86deaa15782fab
SSLsplit 0.4.5
Posted Nov 9, 2012
Site roe.ch

SSLsplit is a tool for man-in-the-middle attacks against SSL/TLS encrypted network connections. Connections are transparently intercepted through a network address translation engine and redirected to SSLsplit. SSLsplit terminates SSL/TLS and initiates a new SSL/TLS connection to the original destination address, while logging all data transmitted. SSLsplit is intended to be useful for network forensics and penetration testing.

Changes: This maintenance release fixes a number of bugs, including daemon mode issues related to threading and a problem in the Linux netfilter support. It adds support for 2048-bit and 4096-bit Diffie-Hellman.
tags | tool, encryption
MD5 | c8be86a071ed8dc0a17b1ab9d7da8937
OpenSSH 6.0p1 Backdoor Patch 1.2
Posted Nov 1, 2012
Authored by shaolininteger

This patch is for openssh-6.0p1 source which combines a known openssh backdoor and Sebastian Krahmer's openssh.reverse capabilities. Telnet to target openssh server and issue udc_gamai_magic string for getting reverse openssh connection.

tags | encryption
MD5 | 6fbc09cef0a9184c20c78db1d75772eb
Entropy Broker RNG 2.0
Posted Oct 30, 2012
Authored by Folkert van Heusden | Site vanheusden.com

Entropy Broker is an infrastructure for distributing cryptographically secure random numbers (entropy data) from one or more servers to one or more clients. Entropy Broker allows you to distribute entropy data (random values) to /dev/random devices from other systems (real servers or virtualised systems). It helps preventing that the /dev/random device gets depleted; an empty /dev/random-device can cause programs to hang (waiting for entropy data to become available). This is useful for systems that need to generate encryption keys, run VPN software or run a casino website.

Changes: Entropy broker is now fully multi-threaded so that no client can block the broker, and higher bitrates can now be achieved. The OpenSSL dependency has been replaced by the crypto++ library. A 'configure' script has been added. This release has been checked for software defects with Coverity. The network protocol has been adapted for bigger block sizes. Ciphers/hashes are now fully user selectable. There is reduced broker entropy usage.
tags | tool, encryption
systems | linux
MD5 | 87e3bde461e6dafa8fee692541955cb9
ccrypt 1.10
Posted Oct 19, 2012
Authored by Peter Selinger | Site ccrypt.sourceforge.net

ccrypt is a command line utility for encrypting and decrypting files and streams. It was designed as a replacement for the standard Unix crypt utility, which is notorious for using a very weak encryption algorithm. ccrypt is based on the Rijndael cipher, which is the U.S. government's chosen candidate for the Advanced Encryption Standard (AES). This cipher is believed to provide very strong security. A compatibility mode is included for decrypting legacy "unix crypt" files.

Changes: This release fixes a number of minor portability issues and minor bugs, factors ccrypt core functionality into a convenience library (libccrypt.a), adds a ccguess program to assist in the recovery of mistyped keys, improves error checking and fixes minor compiler warnings, adds minor improvements to Emacs support, and adds a --disable-emacs configuration option.
tags | tool, encryption
systems | unix
MD5 | 44ddd763465c254df83f5d38851d04d7
OpenSSH 6.0p1 Backdoor Patch
Posted Oct 19, 2012
Authored by shaolininteger

This patch is for openssh-6.0p1 source which combines a known openssh backdoor and Sebastian Krahmer's openssh.reverse capabilities.

tags | encryption
MD5 | eef42eead94c61c0f652d5b37f248c7f
Page 5 of 89
Back34567Next

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    1 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close