CrypToolProject / CrypTool-2Links
Official CrypTool 2 (CT2) repository. CT2 is an open-source software for learning about cryptography and cryptanalysis interactively. CT2 provides a comprehensive suite of tools to deeply explore algorithms and protocols, making it perfect for both academic study and personal exploration. It also includes features for analyzing historical cipher…
☆142Updated 3 months ago
Alternatives and similar repositories for CrypTool-2
Users that are interested in CrypTool-2 are comparing it to the libraries listed below
Sorting:
- azdecrypt is a fast and powerful hillclimbing classical cipher solver written in freebasic☆122Updated 6 months ago
- Utility for testing random and pseudorandom sequences, either as bytes or bit streams, reporting entropy, mean value, serial correlation,…☆100Updated last year
- Hex patterns, include patterns and magic files for the use with the ImHex Hex Editor☆845Updated last week
- BusKill's main CLI/GUI app for arming/disarming/configuring the BusKill laptop kill cord☆233Updated 5 months ago
- A Saleae Analyzer for TPM traffic that only requires the LADD & LFRAME signals, no clock.☆145Updated last year
- JCrypTool Core Plug-ins☆172Updated 2 years ago
- ☆272Updated 5 months ago
- stegosuite is a open source steganography tool written in java☆39Updated 8 months ago
- A repository to collaborate on the UX rebuild of Have I Been Pwned☆62Updated last month
- A tool for side-channel attacks (SCAs) using deep learning (DL)☆14Updated 5 months ago
- PEiD detects most common packers, cryptors and compilers for PE files.☆307Updated 8 years ago
- ☆178Updated 7 months ago
- A software SIM card.☆348Updated last year
- A simple, very experimental TPM sniffer for LPC bus☆627Updated last year
- ☆20Updated 2 weeks ago
- Ascon - Lightweight Authenticated Encryption & Hashing☆243Updated 3 weeks ago
- Security advisories for vulnerabilities☆72Updated 8 months ago
- The Pattern Language used by the ImHex Hex Editor☆233Updated 3 weeks ago
- A tool to download all Pwned Passwords hash ranges and save them offline so they can be used without a dependency on the k-anonymity API☆976Updated 5 months ago
- Thirteen Years of Tor Attacks☆318Updated 2 years ago
- ☆126Updated 3 years ago
- BLint is a Binary Linter to check the security properties, and capabilities in your executables. Since v2, blint is also an SBOM generato…☆402Updated last month
- Unofficial and insecure Signal app, used by senior Trump officials like Mike Waltz, downloaded from the official TeleMessage website☆185Updated 4 months ago
- Regshot is a small, free and open-source registry compare utility that allows you to quickly take a snapshot of your registry and then co…☆415Updated 6 years ago
- Known attacks on Elliptic Curve Cryptography☆556Updated 10 months ago
- Solution descriptions for all the problems on foreverCTF☆12Updated last year
- CRY.ME (CRYptographic MEssaging application)☆169Updated 2 years ago
- Plugin framework for HxD's data inspector☆179Updated 3 years ago
- Hex Viewer/Editor/Analyzer compatible with Linux/Windows/MacOS☆860Updated 2 weeks ago
- The GNU crypto library. NOTE: Maintainers are not tracking this mirror. Do not make pull requests here, nor comment any commits, submit t…☆246Updated this week