Archive | Cryptography




OneLogin Hack – Encrypted Data Compromised

The OneLogin hack is blowing up now it seems like whoever got access can also decrypt encrypted customer data which is just about AS BAD as it can get for a password/identity management service. Now I’m a HUGE supporter of password management tools as I’ve mentioned many times here, so anyone who signed up for […]

Tags: , , , , , , ,

Posted in: Cryptography, Exploits/Vulnerabilities, Privacy, Web Hacking | Add a Comment

sheep-wolf – Exploit MD5 Collisions For Malware Detection

sheep-wolf is a tool to help you Exploit MD5 Collisions in software, specially malware samples which are commonly detected using MD5 hash signatures. and then a malicious one (Wolf) that have the same MD5 hash. Please use this code to test if the security products in your reach use MD5 internally to fingerprint binaries and […]

Tags: , , , , , , ,

Posted in: Cryptography, Forensics, Malware | Add a Comment

Pybelt – The Hackers Tool Belt

Pybelt is a Python-based hackers tool belt capable of cracking hashes without prior knowledge of the algorithm, scanning ports on a given host, searching for SQLi vulnerabilities in a given URL, verifying that your Google dorks work like they should, verifying the algorithm of a given hash, scanning a URL for XSS vulnerability, and finding […]

Tags: , , , , , , ,

Posted in: Cryptography, Hacking Tools, Network Hacking | Add a Comment

WannaCry Ransomware Foiled By Domain Killswitch

Whilst I was away on a tropical island enjoying myself the Infosec Internet was on fire with news of the global WannaCry ransomware threat which showed up in the UK NHS and was spreading across 74 different countries. The Ransomware seems to be the first that is P2P using an SMB exploit from the NSA […]

Tags: , , , , , , , , ,

Posted in: Cryptography, Exploits/Vulnerabilities, Malware | Add a Comment

pemcracker – Tool For Cracking PEM Files

pemcracker is a tool for cracking PEM files that are encrypted and have a password. The purpose is to attempt to recover the password for encrypted PEM files while utilising all the CPU cores. Inspired by Robert Graham’s pemcrack, it still uses high-level OpenSSL calls in order to guess the password. As an optimisation, instead […]

Tags: , , , , , , , ,

Posted in: Cryptography, Hacking Tools, Password Cracking | Add a Comment

spectrology – Basic Audio Steganography Tool

spectrology is a Python-based audio steganography tool that can convert images to audio files with a corresponding spectrogram encoding, this allows you to hide hidden messages via images inside audio files. Using this tool you can select range of frequencies to be used and all popular image codecs are supported. Usage

Example

You […]

Tags: , , , , , ,

Posted in: Cryptography, Hacking Tools, Privacy | Add a Comment

HashData – A Command-line Hash Identifying Tool

HashData is a Ruby-based command-line REPL Hash Identifying Tool with support for a lot of different (most popular) hash types. Installation

Usage Command Line When installed, run hashdata and paste in hashes when prompted. Library Example Script:

The above should output true. The library only matches the start of your second input, this […]

Tags: , , , , , , , , , , ,

Posted in: Cryptography, Hacking Tools, Password Cracking | Add a Comment

European Commission Pushing For Encryption Backdoors

The debate surrounding encryption backdoors has been raging on for years with governments (that typically don’t really understand the things they are pushing for) requesting all software have government ‘secured’ backdoor keys. This is now getting more serious in Europe with the EC actually forcing the issue (in a passive aggressive kind of way for […]

Tags: , , , , , ,

Posted in: Cryptography, Legal Issues, Privacy | Add a Comment

HashPump – Exploit Hash Length Extension Attack

HashPump is a C++ based command line tool to exploit the Hash Length Extension Attack with various hash types supported, including MD4, MD5, SHA1, SHA256, and SHA512. There’s a good write-up of how to use this in practical terms here: Plaid CTF 2014: mtpox Usage

You can download HashPump here:

Or read more […]

Tags: , , , , , , ,

Posted in: Cryptography, Exploits/Vulnerabilities, Hacking Tools | Add a Comment

ONIOFF – Onion URL Inspector

ONIOFF is basically an Onion URL inspector, it’s a simple tool – written in pure python – for inspecting Deep Web URLs (or onions). It takes specified onion links and returns their current status along with the site’s title. It’s compatible with Python 2.6 & 2.7. Usage

To view all available options run:

[…]

Tags: , , , , , , , , , , , ,

Posted in: Cryptography, Privacy | Add a Comment

Popular Tags

computer-security · darknet · Database Hacking · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · XSS ·