PyCryptodome is a fork of PyCrypto. It brings the following
enhancements with respect to the last official version of
PyCrypto (2.6.1):
* Authenticated encryption modes (GCM, CCM, EAX, SIV, OCB)
* Accelerated AES on Intel platforms via AES-NI
* First class support for PyPy
* SHA-3 (including SHAKE XOFs) and BLAKE2 hash algorithms
* Salsa20 and ChaCha20 stream ciphers
* scrypt and HKDF
* Deterministic DSA
* Password-protected PKCS#8 key containers
* Shamir's Secret Sharing scheme
* Random numbers get sourced directly from the OS (and not from
a CSPRNG in userspace)
* Simplified install process, including better support for Windows
* Cleaner RSA and DSA key generation (largely based on FIPS 186-4)
* Major clean ups and simplification of the code base
The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.
The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.
The Rekall Framework is a completely open collection of tools, implemented in
Python under the GNU General Public License, for the extraction of digital
artifacts from volatile memory (RAM) samples. The extraction techniques are
performed completely independent of the system being investigated but offer
visibility into the runtime state of the system. The framework is intended to
introduce people to the techniques and complexities associated with extracting
digital artifacts from volatile memory samples and provide a platform for
further work into this exciting area of research.
"gag" is a program to scan for "stacheldraht" agents, which are part
of an active "stacheldraht" network. It will not detect trinoo,
the original Tribe Flood Network (TFN), or TFN2K agents. For methods
of detecting trinoo and Tribe Flood Network, see:
http://staff.washington.edu/dittrich/misc/trinoo.analysis
http://staff.washington.edu/dittrich/misc/tfn.analysis
(Why "gag"? Its supposed to be a running joke I started in the trinoo
analysis. trinoo/trinot, "tribe"/civilize, gag/sicken&gesundheit!.
Read the ddos trilogy to find out!)
[ excerpt from developer's web site ]
I2P is an anonymous overlay network - a network within a network.
It is intended to protect communication from dragnet surveillance
and monitoring by third parties such as ISPs.
I2P is used by many people who care about their privacy: activists,
oppressed people, journalists and whistleblowers, as well as the
average person.
No network can be "perfectly anonymous". The continued goal of I2P
is to make attacks more and more difficult to mount. Its anonymity
will get stronger as the size of the network increases and with
ongoing academic review.
The seccure toolset implements a selection of asymmetric algorithms
based on elliptic curve cryptography (ECC). In particular it offers
public key encryption / decryption, signature generation /
verification and key establishment.
ECC schemes offer a much better key size to security ratio than
classical systems (RSA, DSA). Keys are short enough to make direct
specification of keys on the command line possible (sometimes this
is more convenient than the management of PGP-like key rings).
seccure builds on this feature and therefore is the tool of choice
whenever lightweight asymmetric cryptography -- independent of key
servers, revocation certificates, the Web of Trust or even
configuration files -- is required.
Steghide is a steganography tool which is able to hide data in "container
files" and to extract this data again. If you do not know what steganography is
take a look at Neil F. Johnson's paper about steganography at
http://www.jjtc.com/Steganography/
Steghide is designed to be portable and configurable and features hiding data
in bmp, wav and au files, blowfish encryption, MD5 hashing of passphrases to
blowfish keys and pseudo-random distribution of hidden bits ("stego bits") in
the container data.
KSH-93 is the most recent version of the KornShell Language described
in "The KornShell Command and Programming Language," by Morris
Bolsky and David Korn of AT&T Bell Laboratories. The KornShell is
a shell programming language, which is upward compatible with "sh"
(the Bourne Shell), and is intended to conform to the IEEE P1003.2/ISO
9945.2 Shell and Utilities standard. KSH-93 provides an enhanced
programming environment in addition to the major command-entry
features of the BSD shell "csh". With KSH-93, medium-sized programming
tasks can be performed at shell-level without a significant loss
in performance. In addition, "sh" scripts can be run on KSH-93
without modification.
In the Unix tradition, it works with things already there and fills
a empty niche. When incorporating it into your Unix environment, you
keep your command line shell, your editor, your pager, and access to
all your tools, tricks and know-how. Vshnu can operate as an
optional supplemental visual mode to your command line shell. You
switch between command line and visual mode easily as you wish. Your
interface bandwidth and power for Unix operations is on a higher
plane and life gets sweeter.