⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
-
Updated
Mar 26, 2024 - Python
Cryptography, or cryptology is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages.
⚡ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚡
Perform data science on data that remains in someone else's server
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers.
RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
A tool to analyze multi-byte xor cipher
Minimal TOTP generator in 20 lines of Python
A Framework for Encrypted Machine Learning in TensorFlow
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Python implementations of cryptographic attacks and utilities.
pure-python ECDSA signature/verification and ECDH key agreement
A Python wrapper around the OpenSSL library
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
Threshold Access Control (TACo) runtimes for the Threshold Network
A Linux Ransomware
High Octane Triage Analysis
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
How to backdoor Diffie-Hellman
A library for Partially Homomorphic Encryption in Python