111 skills found · Page 1 of 4
ashutosh1206 / CryptonLibrary consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
xaitax / Chrome App Bound Encryption DecryptionBypass Chromium's App-Bound Encryption via Direct Syscall-based Reflective Process Hollowing. Extract cookies, passwords, payment methods & tokens from Chrome, Edge, Brave & Avast - fileless, user-mode, no admin required.
dtjohnson / Xlsx PopulateExcel XLSX parser/generator written in JavaScript with Node.js and browser support, jQuery/d3-style method chaining, encryption, and a focus on keeping existing workbook features and styles in tact.
GhostPack / KeeThiefMethods for attacking KeePass 2.X databases, including extracting of encryption key material from memory.
S3N4T0R-0X0 / BEARBear C2 is a compilation of C2 scripts, payloads, and stagers used in simulated attacks by Russian APT groups, Bear features a variety of encryption methods, including AES, XOR, DES, TLS, RC4, RSA and ChaCha to secure communication between the payload and the operator machine.
Licoy / Encrypt Body Spring Boot Starter🔒 SpringBoot控制器统一的响应体编码/加密与请求体解密的注解处理方式,支持MD5/SHA/AES/DES/RSA | SpringBoot controller unified response body encoding/encryption and request body decryption annotation processing method.
iilegacyyii / ShellcryptA QoL tool to obfuscate shellcode. In the future will be able to chain encoding/encryption/compression methods.
nielsmouthaan / SecureNSUserDefaultsNSUserDefaults category for iOS and Mac OS X with additional methods to securely save data using strong AES 256-bit encryption.
calccrypto / EncryptionsA C++ Encryption Library
awslabs / Speke Reference ServerSecure Packager and Encoder Key Exchange (SPEKE) is part of the AWS Elemental content encryption protection strategy for media services customers. SPEKE defines the standard for communication between our media services and digital rights management (DRM) system key servers. This project provides the basic framework that partners can specialize and extend to support their specific method of Digital Rights Management while utilizing AWS' video streaming solutions.
SilentVoid13 / Silent PackerAn ELF / PE binary packer written in pure C, made for fun
Nocatnoyou / FL EASGDFL-EASGD: Federated Learning Privacy Security Method Based on Homomorphic Encryption
JapsimarSinghWahi / DeepSteganographyEver sent a hidden message in invisible ink to your friends? Are you intrigued by the idea of cryptic message exchange? How about using images for this exchange? Steganography is what you need! It is one of the techniques of encryption and over the years, steganography has been used to encode a lower resolution image into a higher resolution image. But steganography using naive methods, like LSB manipulation, is susceptible to statistical analysis. Our model extends existing deep learning research for encoding multiple secret images onto a single cover by leveraging convolutional neural networks based deep learning architectures. DeepSteg allows senders to embed up to three secret images onto a single cover using an encoder network and then have multiple decoder networks to obtain the embedded secrets.
CosmodiumCS / MK15 SkeletonKeySkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are not limited to brute-forcing, cryptographic word-listing, letter frequencies, plaintext formatting, and cracking.
vchatterji / Tpm2 LuksThis describes a method of transparent encryption using TPM2.0 and LUKS
kfogel / OneTimeAn open source encryption program that uses the "one-time pad" method.
epsylon / AnontwiAnontwi is a tool for OAuth2 applications (such as: GNUSocial, Twitter) that provides different layers of encryption, privacy methods and proxy features.
ipcrypt-std / Draft Denis IpcryptMethods for IP Address Encryption and Obfuscation.
thoughtbot / NSString TBEncryptionTiny CocoaPod for NSString Encryption methods
vishwaspaikra007 / BlockchainIn the healthcare system, there is a lot of patient data that is stored and this data needs to be safe and private. With blockchain the data is visible to everyone and hence solves key issues like trust in a network with its ensured transparency of data in a blockchain network. Blockchain provides enhanced security where every transaction recorded needs to be agreed upon according to the consensus method. Blockchain networks are also immutable which means the data, once written, cannot be reverted by any means. All these features of blockchain guarantees the data to be secure and authentic but it also takes away the privacy any user would want in any network. Ability to provide limited access and the right to delete all information of the user is almost next to impossible in any blockchain network. Blockchain is a decentralised network but by using a centralised system along with the blockchain we can ensure true privacy while taking all the benefits of blockchain network by using the method of two way encryption. So this paper states a method to achieve privacy and securely store the data (patient data) in a blockchain network using a centralised system to provide privacy to its users while having all the features of a blockchain network such as transparency, security, data immutability and consensus.