(Page 2 of 3)   < Prev  1 2 3  Next >

Category: Cryptography » Cryptoanalysis

HIFN 7951 Linux Driver
Added 2002-09-04
by SecurityData
HIFN 7951 Linux Driver can manage up to 64 HiFn7951 based cards. It uses the API provided by the cryptolib designed by Martin Gadbois, and should work with both 2.2 and 2.4 kernels.

OpenAI
Added 2002-05-10
by thornhalo
The OpenAI site is centered around an Open Source project and community involving artificial intelligence. The project itself is the creation of a set of tools that are considered to be models of human intelligence or biomimicry. These tools are intended to be integrated into applications or used stand alone for research.

keyanalyze
Added 2002-04-12
by M. Drew Streib
keyanalyze is designed to analyze keyrings in the OpenPGP format (PGP and GnuPG). It looks at properties of connectivity to generate strongly-connected set analysis, as well as some arbitrary statistics including a "mean shortest distance" calculation to show the most connected keys. This code is also used to create a report based on an extremely large keyset once per month.

authd
Added 2002-03-12
by Brent N. Chun
authd is a software package for obtaining and verifying user credentials which contain cryptographic signatures based on RSA public key cryptography. It includes (i) a server (authd) for authenticating local users through UNIX domain sockets and processing credentials and (ii) a client library (libauth.a) for requesting new credentials and verifying credentials signed by the server.

CDSA
Added 2001-10-22
by Apple Computer, Inc
The Apple CDSA framework contains an expandable set of cryptographic algorithms to perform code signing and encryption operations while maintaining the security of the cryptographic keys. It also contains libraries which allow the interpretation of X.509 certificates. The CDSA code is used by MacOSX features such as Keychain and URL Access for protection of login data. Many cryptographic algorithms are available in the Apple CSP (Cryptographic Service Provider) module.

Cfdecrypt
Added 2001-10-22
by Matt Chapman
CFDECRYPT: Decrypt Cold Fusion templates encrypted with CFCRYPT

CAP
Added 2001-10-22
by Richard Spillman
CAP is a complete tool for cryptanalysis. It allows for encryption and decryption using several common algorithms. It provides tools for cryptanalysis of these and other ciphers. Among the tools are frequency analysis, Kasiski analysis, word patterns, anagramming, and a special autosolve tool. In addition, CAP provides a GAME option that will randomly generate ciphers and challenge you to break them. You can download a demo version of CAP from the download area of this page. Along with CAP you should download the CAP handbook which provides you with a complete CAP manual and a tutorial on ciphers and cryptanalysis.

SmartParse
Added 2001-10-22
by NullString
SmartParse is a a great tool for any cracking/cryptanalysis enthusiast. SmartParse will create, sort, manage, and parse wordlists in order to configure them to your liking. This program is so powerfull, you could do New York Times style crossward puzzles/cryptograms with it. Included in the program is a wordlist sorter, configurable random number generator, wordlist creation utility, and wordlist parser.

XOR Cipher Analyzer
Added 2001-10-22
by Marvin, marvin@nss.nu
XOR-analyze is a program for cryptanalyzing (breaking) one of the most easily-breakable ciphers. It works with variable key lengths and includes an encryption/decryption program.

Advanced Office 2000 Password Recovery
Added 2001-10-22
by Elcom Ltd.
A program to recover lost or forgotten passwords to files/documents created in Microsoft Office applications (all versions): Word, Excel, Access (including user-level passwords and owner info), Project, Money, PowerPoint, Visio, Backup, Schedule+, Mail. Can also reset MS Internet Explorer (3/4/5) Content Advisor password, and open password-protected VBA projects (created in any application) via the "backdoor". Most passwords are being recovered instantly; the "password to open" in Word/Excel 97/2000 can be recovered using "brute-force" and dictionary attacks, highly optimized for speed (the performance is about 5 million passwords per minute on PII).

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


 

Privacy Statement
Copyright 2010, SecurityFocus