covert
featherduster
covert | featherduster | |
---|---|---|
10 | 1 | |
38 | 1,058 | |
- | 0.0% | |
0.0 | 0.0 | |
24 days ago | over 2 years ago | |
Python | Python | |
- | BSD 3-clause "New" or "Revised" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
covert
-
Picocrypt, Kryptor or Hat?
Which features are you looking for? Just encryption, or also signatures? Do you want to encrypt messages, files or both? All the applications that you mention are more or less experimental, and to that degree I will add https://github.com/covert-encryption/covert which I am one developer of.
-
Real-World Cryptography by David Wong (2021) Book Review
Yes, hiding ephemeral keys and signatures is something that Covert Encryption that I am working on implements. But using Elligator 2 by itself is not enough and it turns out that very few people in the world know how to do it right (I gather that Loup Vaillant did his own research a couple of years back, although he did consult Reddit for it, and as far as I can tell, no-one else had published an implementation prior to his MonoCypher).
-
Text encryption software for encrypting notes
Industry standard, no. And most encryption software don't offer the ability to edit files directly. There certainly are websites that can do this in your browser completely locally, if you trust the Javascript they send you, and the implementations which are usually by someone just learning cryptography.
-
AEAD output format
To avoid revealing anything in plain text (presumably you would put authentication headers and perhaps the message length in AD), see how we handle it in Covert Encryption: https://github.com/covert-encryption/covert/blob/main/docs/Specification.md
- Covert Encryption
-
[Hiring] Experienced in Python toolchains and Qt/pyside?
For information on the project itself, see https://github.com/covert-encryption/covert
-
Why did they do it this way?
On #2 there is a format and toolset that I am working on with similar goals, for message and file encryption. You can use either shared passphrases or 25519 public keys to protect your data. It is and will always be completely free in both meanings of the word. https://github.com/covert-encryption/covert
-
Sunday Daily Thread: What's everyone working on this week?
Just pushed out another release of https://github.com/covert-encryption/covert/ which is a tool that encrypts files and messages faster and better than anything else, and produces much shorter output than PGP, suitable to be used on message boards because it can fit even in a Twitter message. 100 % Python code of course.
-
Modern signing and encryption
PGP pretty much sucks in file encryption too. It uses bad default settings and runs very slowly. Age is far better and I am working on one that should be even faster and more secure, using modern cryptography only. https://github.com/covert-encryption/covert
featherduster
-
Awesome CTF : Top Learning Resource Labs
FeatherDuster - An automated, modular cryptanalysis tool.
What are some alternatives?
Picocrypt - A very small, very simple, yet very secure encryption tool.
python-fpe - FPE - Format Preserving Encryption with FF3 in Python
Kryptor - A simple, modern, and secure encryption and signing tool that aims to be a better version of age and Minisign.
cryptg - Official Telethon extension to provide much faster cryptography for Telegram API requests.
age - A simple, modern and secure encryption tool (and Go library) with small explicit keys, no config options, and UNIX-style composability.
TMOHS1-Root-Utility - An interactive python script that enables root access on the T-Mobile (Wingtech) TMOHS1, as well as providing several useful utilites to change the configuration of the device.
eddyizm - Creating a new personal site, blog using django and python.
Crypton - Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
peda - PEDA - Python Exploit Development Assistance for GDB
Backdoorcreator - Exploit toolkit
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Metasploit - Metasploit Framework