Red October
Red October is a software-based two-man rule style encryption and decryption server.
Poorly seeding a cryptographically secure pseudorandom number generator (CSPRNG) can lead to security vulnerabilities. It is crucial to use high-quality entropy sources like /dev/random instead of /dev/urandom for generating long-lived keys.
Red October is a software-based two-man rule style encryption and decryption server.
A tool for recovering files by scanning block devices and extracting them based on 'magic bytes' in file contents.
A browser extension that helps you find and track sensitive data exposure across the web.
Steganography brute-force utility with performance issues, deprecated in favor of stegseek.
A toolkit for testing, tweaking and cracking JSON Web Tokens
A Docker image with tools for solving Steganography challenges and screening scripts for analyzing files.