Poorly seeding a cryptographically secure pseudorandom number generator (CSPRNG) can lead to security vulnerabilities. It is crucial to use high-quality entropy sources like /dev/random instead of /dev/urandom for generating long-lived keys.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
de4dot is a .NET deobfuscator and unpacker with the ability to restore packed and obfuscated assemblies to their original form.
Steghide is a steganography program that hides data in image and audio files.
Simple C++ Encryption and Steganography tool for hiding files inside images using LSB encoding.
A Docker image with tools for solving Steganography challenges and screening scripts for analyzing files.
A utility tool for decrypting data from weak public keys and attempting to recover the corresponding private key, primarily for educational purposes.
A command line tool for transparently hiding files within images using LSB steganography.
A tool for creating cryptographically strong volumes that destroy themselves upon tampering or via issued command.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.