Entropy Source Evaluation Logo

Entropy Source Evaluation

0
Free
Visit Website

Poorly seeding a cryptographically secure pseudorandom number generator (CSPRNG) can lead to security vulnerabilities. It is crucial to use high-quality entropy sources like /dev/random instead of /dev/urandom for generating long-lived keys.

FEATURES

ALTERNATIVES

A package for hiding data inside jpeg files using steganography techniques.

A tool for recovering files by scanning block devices and extracting them based on 'magic bytes' in file contents.

steg86 is a format-agnostic steganographic tool for x86 and AMD64 binaries.

Showcasing bad cryptography and discussing flawed crypto design.

Tool to clean Exif data from images in AWS S3 bucket

Tool for hiding data inside data and manipulating byte sequences.

A steganographic file system in userspace for plausible deniability of files.

A demonstration of a method to delete a locked executable or currently running file from disk.