Security List Network™
Follow Us on FacebookFollow Us on Google+Follow Us on TwitterFollow Us on Pinterest
Menu
  • Home
  • About Us
  • Security Archives
  • Partners
Menu
  • Automation
  • Browser
  • Brute Force
  • Code Scripting
  • Cryptography
  • Encryption
  • Exploits
  • Framework
  • Linux Security Distros
  • Mobile Applications Tools
    • Android Tools
    • iPhone Tools
  • Networking
    • Bluetooth
    • Monitoring/System Administrator
    • Network Mapping/Scanner
    • Packet Sniffer/Sniffing
    • Internet Security
    • Spoofing/Spoofer
    • Wireless/wifi
  • Penetration Test
    • BenchMark
    • Cross Site Scripting(XSS)
    • Fuzzer/Fuzzing
    • Sql Injection
    • Stress Testing
  • Security Tools
    • Anti Malware/Virus – Malware Analysis
    • Firewall
    • Intrussion Detection and Prevention System(IDS/IPS)
    • Registry Analysis

SITEMAP

Archives

Browse: Home   /   Cryptography
alias - modular tool for finding backdoor for Sat.

alias – modular tool for finding backdoor for Sat.

March 4, 2018
Mr.Trojans
Cryptography, Security Tools

modular tool for finding backdoor for Sat (ALIAS) – a customizable scalable tool that can employ incremental state-of-the-art SAT solvers and black-box optimization heuristics to…

Read Article →
BinSkim Binary Analyzer.

BinSkim Binary Analyzer.

February 28, 2018
cydec
Cryptography, Security Tools

BinSkim is a checker that examines Portable Executable (PE) files and their associated Program Database File Formats (PDB) to identify various security problems. These include:…

Read Article →
Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.

Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.

February 4, 2018
Fragile
Browser, Cryptography, Security Tools

Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking. The most accurate way to detect things that happen in a…

Read Article →
Tricks of the Trade - Crypto File Dropper to bypass file detection.

Tricks of the Trade – Crypto File Dropper to bypass file detection.

January 17, 2018
eldad
Cryptography, Encryption, Penetration Test

Tricks of the Trade an Encrypt and embed files to “Droppers” to bypass detection. Encrypt your binary file and embeds them to an executable to…

Read Article →
FSRM-ANTICRYPTO : Protect servers against crypto attacks.

FSRM-ANTICRYPTO : Protect servers against crypto attacks.

December 28, 2017
Fragile
Cryptography, Encryption, Security Tools

Use FSRM-ANTICRYPTO to protect your Windows servers against Crypto attacks and keep the Crypto filegroup extensions up to date. A very completelist is maintained by…

Read Article →
Koadic - Windows post Exploitation tools.

Koadic – Windows post Exploitation tools.

November 17, 2017
0x0ptimus
Code Scripting, Cryptography, Penetration Test

Disclaimer! Code samples are provided for educational purposes. Adequate defenses can only be built by researching attack techniques available to malicious actors. Using this code…

Read Article →
Phishing catcher - Phishing catcher using Certstream.

Phishing catcher – Phishing catcher using Certstream.

November 7, 2017
EL-Capitan
Cryptography, Phishing, Security Tools

Phishing catcher is python scripting for Catching malicious phishing domain names using certstream https://certstream.calidog.io/ SSL certificates live stream. Background and What is Certificate Transparency?: Google’s…

Read Article →
CryptTools - Tools for encryption, decryption and cracking from several cryptography systems.

CryptTools – Tools for encryption, decryption and cracking from several cryptography systems.

September 23, 2017
0x0ptimus
Cryptography, Encryption

CryptTools is a Tools for encryption, decryption and cracking from several cryptographic systems. Tool Lists: + Caesar Chiper: is one of the simplest and most…

Read Article →
1 2 … 15 Next →

Copyright © 2022

Powered by Worldwide CyberSecurity Team.

  • Digital Forensics
  • Networking
  • Penetration Test
  • Security Tools