Explore projects
-
Updated
-
Updated
-
Updated
-
Utility for covertly moving data from one computer to another, by disguising the network traffic to look like a port scan.
Updated -
Unix-based command line file encryption tool that uses the three AES candidate algorithms - Rijndael, Serpent, and Twofish.
Updated -
-
Updated
-
NPC - Nearly Perfect Crypto. Extremely fast and the ultimate crypto program since it uses one time pads. However, key management is a complete bitch.
Updated