PRINT
PRINT
SEND MAIL
SEND MAIL

Category: Cryptography

Windows10

Black Window 10 v2

  Black Window Enterprise 10 Codename : Polemos Black Window 10 Enterprise is the first windows based penetration testing distribution with Linux integrated ! The system comes activated with a digital license for Windows enterprise! It supports windows apps and Linux apps, GUI and terminal apps! It comes with a tone off hacking tools plus all the tools that are included with the latest release of Cerberus Linux! It has managed to implement Cerberus os within windows. Offers the stability of a windows system…

AztarnaCryptographyFingerprintingFootprintingIndustrial RobotsNEW TOOLSRoboticsROSROS2ShodanShodan APISROS

Aztarna – A Footprinting Tool For Robots

This repository contains Alias Robotics' aztarna, a footprinting tool for robots.Alias Robotics supports original robot manufacturers assessing their security and improving their quality of software. By no means we encourage or promote the unauthorized tampering with running robotic systems. This can cause serious human harm and material damages.For ROSA list of the ROS nodes present in the system (Publishers and Subscribers)For each node, the published and subscribed topis including the topic typeFor each node, the ROS services each of the nodes offerA list of…

AES EncryptionCBC AES EncryptionCryptographyDecryptionNEW TOOLSPycryptodomeSecret Keeper

Secret Keeper – Python Script To Encrypt & Decrypt Files With A Given Key

Secret Keeper is a file encryptor written in python which encrypt your files using Advanced Encryption Standard (AES). CBC Mode is used when creating the AES cipher wherein each block is chained to the previous block in the stream. FeaturesSecret Keeper has the ability to generate a random encryption key base on the user input.Secret Keeper can successfully encrypt and decrypt .txt and .docx file types.How to Install and Run in Linux[1] Enter the following command in the terminal to download it.git clone [2] After…

Cloud pentestingComputer ForensicCryptographyDistroNEW TOOLSParrot Security OSPrivacy/AnonimityReverse Engineering

Parrot Security 4.4 – Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind

Parrot 4.4 is now available for download. This release provides security and stability updates and is the starting point for the plan to develop an LTS edition of Parrot. Parrot 4.4 Development GoalsThe Parrot 4.4 development process involved the ideas of many people in the community, and the goal of this new update was mainly to target software developers and increase average system stability.Upgrade from a previous versionsudo parrot-upgradeorsudo apt updatesudo apt full-upgradeDebian Testing stability statusParrot is based on Debian Testing, which is now entering…

Cloud pentestingComputer ForensicCryptographyDistroNEW TOOLSParrot Security OSPrivacy/AnonimityReverse Engineering

Parrot Security 4.3 – Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind

Parrot 4.3 is now available for download. This release provides security and stability updates and is the starting point for the plan to develop an LTS edition of Parrot.Linux 4.18Linux was updated to the 4.18.10 version, and linux 4.19 will be released soon.Firefox 63Firefox 63 provides noticeable security and privacy features, but it is no longer available to 32bit systems, so has been switched to firefox-esr on all the unsupported architectures.Wine menuHas been fixed a bug in the parrot menu configuration that prevented several menu…

BackTrackBash ScriptCryptographyEncryption AlgorithmsEncryption DecryptionEncryption ToolimR0TKaliKali LinuxNEW TOOLSpenetration testingROT13WhatsAppWhatsapp API

imR0T – Send A Message To Your Whatsapp Contact And Protect Your Text By Encrypting And Decrypting (ROT13)

imR0T: Send a quick message with simple text encryption to your whatsapp contact and protect your text by encrypting and decrypting, basically in ROT13 with new multi encryption based algorithm on ASCII and Symbols Substitution.How To UseIt's simple:# Clone this repositorygit clone Go into the repositorycd imR0T# Permission Acceschmod +x imR0T# Run the app./imR0TCommand Linehelp: A standard command displaying help.imR0T╺─╸[ cli ] > help | |_ Options:[arguments] help |:| show this message show |:| show all modules from this tools list style |:|…

Cloud pentestingComputer ForensicCryptographyDistroNEW TOOLSParrot Security OSPrivacy/AnonimityReverse Engineering

Parrot Security 4.2.2 – Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind

Updated kernel and core packagesParrot 4.2 is powered by the latest Linux 4.18 debianized kernel with all the usual wireless patches.A new version of the Debian-Installer now powers our netinstall images and the standard Parrot images.Firmware packages were updated to add broader hardware support, including wireless devices and AMD vega graphics.AppArmor and Firejail profiles were adjusted to offer a good compromise of security and usability for most of the desktop and CLI applications and services.Important destkop updatesParrot 4.2 now provides the latest libreoffice 6.1…

CloakifyCryptographyData ExfiltrationDNSLLMNRMimicNEW TOOLSPacket CapturePacketWhisperPentest ToolSwiss Army Knife

PacketWhisper – Stealthily Exfiltrate Data And Defeat Attribution Using DNS Queries And Text-Based Steganography

PacketWhisper - Stealthily Transfer Data & Defeat Attribution Using DNS Queries & Text-Based Steganography, without the need for attacker-controlled Name Servers or domains; Evade DLP/MLS Devices; Defeat Data- & DNS Name Server Whitelisting Controls. Convert any file type (e.g. executables, Office, Zip, images) into a list of Fully Qualified Domain Names (FQDNs), use DNS queries to transfer data. Simple yet extremely effective.AuthorJoe Gervais (TryCatchHCF)Why is this different from every other DNS exfiltration technique?Traditional DNS exfiltration relies on one of the following: DNS tunneling; Hiding…

CryptographyCryptonCTFCTF ChallengesCTF SolutionsCTF ToolsHashingMacNEW TOOLS

Crypton – Library Consisting Of Explanation And Implementation Of All The Existing Attacks On Various Encryption Systems, Digital Signatures, Hashing Algorithms

Crypton is an educational library to learn and practice Offensive and Defensive Cryptography. It is basically a collection of explanation and implementation of all the existing vulnerabilities and attacks on various Encryption Systems (Symmetric and Asymmetric), Digital Signatures, Message Authentication Codes and Authenticated Encryption Systems. Each attack is also supplemented with example challenges from "Capture The Flag" contests and their respective write-ups. Individuals who are already acquainted (or are into CTFs) with this field can use Crypton as a tool to solve challenges based…

Cloud pentestingComputer ForensicCryptographyDistroNEW TOOLSParrot Security OSPrivacy/AnonimityReverse Engineering

Parrot Security 4.0 – Security GNU/Linux Distribution Designed with Cloud Pentesting and IoT Security in Mind

Parrot 4.0 is now available for download. The development process of this version required a lot of time, and many important updates make this release an important milestone in the history of our project.This release includes all the updated packages and bug fixes released since the last version (3.11), and it marks the end of the development and testing process of many new features experimented in the previous releases since Parrot 3.9.Experimental Netinstall ImagesNetinstall images are a powerful tool to install only the bare…