The Latest Cryptography

Find the Best Cryptography from 2018 here:


European Commission Pushing For Encryption Backdoors

European Commission Pushing For Encryption Backdoors

The debate surrounding encryption backdoors has been raging on for years with governments (that typically don’t really understand the things they are pushing for) requesting all software have government ‘secured’ backdoor keys. This is now getting more serious in Europe with the EC actually forcing the issue (in a passive aggressive kind of way for […]

Topic: Cryptography, Legal Issues, Privacy
HashPump - Exploit Hash Length Extension Attack

HashPump – Exploit Hash Length Extension Attack

HashPump is a C++ based command line tool to exploit the Hash Length Extension Attack with various hash types supported, including MD4, MD5, SHA1, SHA256, and SHA512. There’s a good write-up of how to use this in practical terms here: Plaid CTF 2014: mtpox Usage

You can download HashPump here:

Or read more […]

Topic: Cryptography, Exploits/Vulnerabilities, Hacking Tools
ONIOFF - Onion URL Inspector

ONIOFF – Onion URL Inspector

ONIOFF is basically an Onion URL inspector, it’s a simple tool – written in pure python – for inspecting Deep Web URLs (or onions). It takes specified onion links and returns their current status along with the site’s title. It’s compatible with Python 2.6 & 2.7. Usage

To view all available options run:

[…]

Topic: Cryptography, Privacy
hashID - Identify Different Types of Hashes

hashID – Identify Different Types of Hashes

hashID is a tool to help you identify different types of hashes used to encrypt data, especially passwords. It’s written in Python 3 and supports the identification of over 220 unique hash types using regular expressions. hashID is able to identify a single hash, parse a file or read multiple files in a directory and […]

Topic: Cryptography, Hacking Tools, Password Cracking
China To Outlaw All Unapproved VPN Services

China To Outlaw All Unapproved Darknet VPN Services

So the latest news from behind the Great Firewall of China is that they plan to crack down on all unapproved Darknet VPN services. This means all VPN providers, cloud service providers and ISPs will have to seek an annually renewed licence to operate a VPN Service. Really, not very surprising coming out of China […]

Topic: Cryptography, Privacy
Wycheproof - Test Crypto Libraries Against Known Attacks

Wycheproof – Test Crypto Libraries Against Known Attacks

Project Wycheproof is a tool to test crypto libraries against known attacks. It is developed and maintained by members of Google Security Team, but it is not an official Google product. At Google, they rely on many third party cryptographic software libraries. Unfortunately, in cryptography, subtle mistakes can have catastrophic consequences, and they found that […]

Topic: Countermeasures, Cryptography, Secure Coding