Linux

DES_GEN - DES Cracker (Dictionary Based Brute Force)

DES_GEN was written as a POC for a specific application that shall remain anonymous several months ago.

The belief at the company was that cracking DES requires custom hardware (See EFF's US$250,000 DES cracking machine) so the vendor refused to update to newer methods of password storage.

Here's a single threaded x86 based slap in the face for that company written in perl none the less - yes a dictionary file and some fairly weak mutations cracked your root password in 46 minutes.

I'm not sure if anyone will get any use out of this, but here it is.

--If there is enough interest in updates or future releases Threading and CUDA support may be added. Cheers.

Author(s): 
EverestX
Version: 
B4_POC
Date: 
8/2011
Filename: 
Size: 
2.60KB
Requirements: 

Perl, Word list, DES

Status: 
Inactive

Menu Maker for C

The Menu Maker for C is a program that creates the source code for a command-line interface menu based on the input you provide. The program is targeted toward scripting and ease of building a more complex yet organized application. Simply compile and run. The produced source code is simple to modify, and new menu systems can easily be created by modifying an input file used to pipe input to the Menu Maker's stdin.

This release includes gcc-compatible source and a sample input file.

A more thorough tutorial is currently available in the Tutorials section.

Author(s): 
Jerbo
Version: 
1.00
Date: 
07-27-2011
Filename: 
Size: 
4.00KB
Requirements: 

GCC or similar compiler

Status: 
Active
Future Plans: 
Add Windows support
Add support for other-than-void-void function calls

16-bit Rijndael

My studies in cryptography lately have lead me to put together a trimmed down version of the Rijndael (AES) cipher for educational purposes.

This only has 16 bit blocksize and 16 bit key BUT is designed to be easy to follow and debug. This helps in regards to practicing your linear / differential cryptanalysis skillz.

This is by no means secure enough to encrypt sensitive data. It's simply a toy to play with and learn from.

Written in C#. This is not an executable but the Example.cs file can be compiled into an exe without code modifications. The code was test driven - tests are included.

This not intended to be a standalone application.

Author(s): 
Kayin
Version: 
1.00
Date: 
02-26-2011
Size: 
8.00KB
Requirements: 

.NET 3.5

Status: 
Inactive
Future Plans: 
N/A

SX Webserver

SX Webserver is a simple event driven tcp socket webserver for educational purposes or embedded devices with very limited resources.

usage: sxwebserver -m [1.1/1.0] -p [port] -d [dir]

Author(s): 
neotek
Version: 
1.00
Date: 
02-25-2011
Filename: 
Size: 
19.10KB
Requirements: 

C

Status: 
Active
Future Plans: 
More filetypes
Directory generation support (pretty HTML pages for directory listings)

JAWS

J.A.W.S.
(Just Another Wireless Script)

The purpose of this script is to create 3 basic files with example configurations. Backtrack does not come with a wpa_supplicant.conf file or a /etc/resolv.conf file. Although /etc/resolv.conf is easy to fix, I do not always remember what is supposed to be in wpa_supplicant.conf.
So I have made this script to give an example of what should be in the file, so all you need to do is change encrypted key and ssid (name of the wirless network) and you should be alright. Don't forget to make the IP's match your network as this script includes making an example /etc/network/interface file as well. The script assumes you already have drivers in place and are able to see the all network adapters with an ifconfig. I realize that some things in this script man not be necessary such as changing the directory, but it's more as a reference to show people the directory structure of where the files are located.

Author(s): 
cisc0ninja
Version: 
1.00
Date: 
12-06-2009
Filename: 
Size: 
8.00KB
Requirements: 

Linux

Wireless card and driver

Status: 
Active
Future Plans: 
Add ability to gather data about the network and autoconfigure.

Voices

This program uses steganography standards to hide a file within a specified .mp3. And later, be able to retrieve that file in it's entirety. The file may be of any type as long as it is of a relatively smaller size than that of the .mp3 it will be hidden in. While it will work with any file format, this program was designed for the capacity of hiding documents, emails, and other textual data without the use of true encryption. It is important to understand that this program will not actually encrypt the file, it will only hide the file.

Author(s): 
Conundrum (David Condrey)
Date: 
09-24-2002
Filename: 
Size: 
132.34KB
Status: 
Inactive
Future Plans: 
If people are interested, this project could be continued.
Syndicate content