Cryptography II Courses Online

Live Instructor Led Online Training Cryptography II courses is delivered using an interactive remote desktop! .

During the course each participant will be able to perform Cryptography II exercises on their remote desktop provided by Qwikcourse.


How do I start learning Cryptography II?


Select among the courses listed in the category that really interests you.

If you are interested in learning the course under this category, click the "Book" button and purchase the course. Select your preferred schedule at least 5 days ahead. You will receive an email confirmation and we will communicate with trainer of your selected course.

Cryptography II Training


Learn mimikatz

About

A little tool to play with Windows security

mimikatz is a tool that makes some "experiments" with Windows security. It's well-known to extract plaintexts passwords, hash, PIN code and kerberos tickets from memory. It can also perform pass-the-hash, pass-the-ticket or build Golden tickets; play with certificates or private keys, vault and more.


7 hours

$1,990

Discover Shadowsocks for Windows

About

A secure socks5 proxy for Windows

Shadowsocks for Windows is a free and open source, high-performance secured socks5 proxy designed to protect your internet traffic. It allows you to surf the web privately and securely, and offers a number of useful features such as HTTP proxy support, system proxy configuration, server auto switching and plugin support. Shadowsocks is incredibly fast, as it utilizes bleeding edge techniques with Asynchronous I/O and event-driven programming. It also has a flexible industry-level encryption algorithm that supports custom algorithms. Shadowsocks for Windows requires a Microsoft .NET Framework 4.7.2 or higher, as well as Microsoft Visual C++ 2015 Redistributable (x86).


7 hours

$1,990

Discover VeraCrypt

About

Open source disk encryption with strong security for the Paranoid

VeraCrypt is a free disk encryption software brought to you by IDRIX () and based on TrueCrypt 7.1a. It adds enhanced security to the algorithms used for system and partitions encryption making it immune to new developments in brute-force attacks. It also solves many vulnerabilities and security issues found in TrueCrypt. This enhanced security adds some delay ONLY to the opening of encrypted partitions without any performance impact to the application use phase. This is acceptable to the legitimate owner but it makes it much harder for an attacker to gain access to the encrypted data. All released files are PGP signed with key ID=0x680D16DE, available on key servers and downloadable at VeraCrypt can mount TrueCrypt volumes. It also can convert them to VeraCrypt format. Documentation: FAQ :


7 hours

$1,990

Know BeeCrypt Cryptography Library

About

BeeCrypt is an ongoing project to provide a strong and fast cryptography toolkit. Includes entropy sources, random generators, block ciphers, hash functions, message authentication codes, multiprecision integer routines, and public key primitives.


7 hours

$1,990

Learn Poptop

About

Poptop is an open source implementation of a PPTP server. Running under x86 or embedded Motorola ColdFire architectures Poptop provides full interoperability with the Microsoft PPTP VPN client.


7 hours

$1,990

Fundamentals of FreeOTFE

About

A free "on-the-fly" transparent disk encryption program for PC & PDAs.

An upstream source site housing the original files for this mirror is no longer available. With this software, you can create one or more "virtual disks" on your PC/PDA. These disks operate exactly like a normal disk, with the exception that anything written to one of them is transparently, and securely, encrypted before being stored on your computer's hard drive.


7 hours

$1,990

Explore Shadowsocks for Android

About

A shadowsocks client for Android

Shadowsocks for Android is the Android client for the widely-used, high-performance encryption protocol project Shadowsocks. It is a secure socks5 proxy for Android that is designed to protect your internet traffic. Shadowsocks for Android allows you to surf the internet privately and securely at all times through your Android device. It features bleeding-edge techniques with Asynchronous I/O and Event-driven programming. It is completely free and open-source and is available for other platforms as well.


7 hours

$1,990

Discover RHash

About

RHash (Recursive Hasher) is a console utility for computing and verifying hash sums of files. It supports CRC32, CRC32C, MD4, MD5, SHA1, SHA256, SHA512, SHA3, AICH, ED2K, DC++ TTH, BTIH, Tiger, GOST R 34.11-2012, RIPEMD-160, HAS-160, EDON-R, and Whirlpool.


7 hours

$1,990

Basics of AirSnort

About

AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP networks. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered.


7 hours

$1,990

Know Portecle

About

Portecle is a user friendly GUI application for creating, managing and examining key stores, keys, certificates, certificate requests, certificate revocation lists and more.


7 hours

$1,990

Work around with Password Safe

About

Popular easy-to-use and secure password manager

Password Safe is a password database utility. Users can keep their passwords securely encrypted on their computers. A single Safe Combination unlocks them all.


7 hours

$1,990

Basics of Password Tech

About

Professional password generator with full Unicode support

Password Tech is a powerful password generator capable of generating large amounts of cryptographically-secure passwords, pronounceable passwords, pattern-based passwords, passphrases composed of words, and scripted passwords. Passwords can be stored in encrypted databases along with user names, URLs, notes, etc. Password Tech provides lots of options to customize passwords to the users' various needs, and individual scripting with Lua gives full control over the process of password generation. Text encryption is also supported.


7 hours

$1,990

Discover FreeArc

About

FreeArc combines best 7-zip and RAR features: auto-selected LZMA/PPMD/Multimedia compression, 1gb dictionary, exe/dict/delta data filters, updatable solid archives, SFXes, recovery record, AES+Twofish+Serpent encryption, Linux support and much more...


7 hours

$1,990

Work around with EncFSMP

About

Mount EncFS folders - multiplatform style.

EncFSMP can create, mount and edit EncFS (encrypted file system) folders on Windows and Mac OS X.


7 hours

$1,990

Explore ccrypt

About

ccrypt is a command-line tool for encrypting and decrypting files and streams. It provides strong encryption based on the Rijndael cipher, a version of which is also used in the Advanced Encryption Standard.


7 hours

$1,990

Explore Abdal 2 Key Triple DES Builder

About

encrypt / decrypt all your texts with Two-Key Triple DES

If you need more security to send your messages, we introduce the new tool of Abdal security team called Abdal 2-Key Triple DES Builder. This tool can actually encrypt all your texts that are to be sent as a message between you and any person. Two-Key Triple DES is used to encrypt these messages. This algorithm performs 3 cryptographic processes on each block of information to reduce the penetration rate. The Abdal 2-Key Triple DES Builder tool has four modes for encrypting your data.


7 hours

$1,990

Know Advanced Encryption Suite

About

A tight python crypto module implementing only the latest and greatest: Rijndael (AES) symmetric cipher in 128, 192 and 256 bits supporting password encryption, SHA 256 and several CSPRNG schemes in pure python.


7 hours

$1,990

Explore Contego Software

About

Tool "Contego" for encryption to plain text (UTF-8) and verification, testing and generation of MD5 and SHA-1 sums for files. Version 2.0 multilnguaje and fully operational. Encriptacion para texto plano (UTF-8) y utilidades para sumas MD5 y SHA-1.


7 hours

$1,990

Know Enigma CS Coding Software

About

Create and use your own personalized, very secure, encoding script!

Create and use your own personalized, yet very secure, encoding script!


7 hours

$1,990

Fundamentals of Java Randomness Test Suite

About

Java Randomness Test Suite is a gui application to run randomness tests on random stream resource (file or algorithm). Application can be run in command line. Includes general statistical tests, NIST and DIEHARD tests.


7 hours

$1,990

Know Pkcs11Interop

About

Managed .NET wrapper for unmanaged PKCS#11 libraries

This project provides stable releases of Pkcs11Interop project hosted on github. Please visit project website - www.pkcs11interop.net - for more information.


7 hours

$1,990

Discover RC4 Crypt

About

RC4Crypt is a petite library that allows you to use RC4 encryption easily in PHP. It's OO and can produce outputs in binary and hex.


7 hours

$1,990

Know SES Super Encypherment Scrambler

About

SES brings back the uncrackable onetime pad, with a digital twist.

SES brings back the uncrackable onetime pad, with a digital twist. It is well known that a random key of message-length is the only provably unbreakable cipher. SES uses cryptographic strength pseudo-random keys of message-length for its many encipherments, in addition to offering true one-time pad capability for the intrepid. SES is built on ISAAC, Bob Jenkins' unbroken CSPRNG, a fast and simple stream cipher placed in the Public Domain in 1996. SES now gives you the ability to efficiently cipher text of arbitrary length or files of any size or type. Use it with confidence. To achieve complete one-on-one privacy, SES traverses several levels en route to its output. The more words in your key-phrase, the more layers of encipherment SES applies. It is part Vigenere, part onetime pad, part cryptographic hash, not to mention the essential scrambler element, each component driven by ISAAC, with all key-derivation and stretching relying on Keccak in 512-bit configuration.


7 hours

$1,990

Explore Secret Sharp

About

Secret Sharp is a wizard based GUI for the Shamir Secret Sharing Algorithm provided by the crypto++ API. Secret Sharp replicates the functionality that 'ssss' provides on unix.


7 hours

$1,990

Learn rar brute force shell script rarbrute

About

This is rarbrute, a shell script to brute force encrypted rar files under unix and linux. A long wordlist and a paper about security in internet cafes is included.


7 hours

$1,990

Learn KisKis Keep It Secret Keep It Safe

About

Platform-independent password manager

KisKis is an easy-to-use password manager. Hierarchical tree structure. The history of each password change can be tracked. Single XML-file-storage encrypted by a single "master-password". Encryption in OpenPGP. Password generator included.


7 hours

$1,990

Learn RuSimpleCrypt

About

A tool to encrypt files in Russian.

Инструмент для шифрования файлов на русском языке. Только для операционной системы Windows. Интеграции с контекстным меню проводника нет. AES шифрование 256 бит. Официальная страница A tool to encrypt files in Russian. Only for the Windows operating system. Integration with Explorer context menu does not. AES encryption of 256 bits. based on


7 hours

$1,990

Learn XorCryptWin

About

XOR Encryptor for Windows

XOR encryption software for Windows. Generates random key files which it then uses to mimic the One-Time Pad encryption technique. Distributed together with RandFileGen, a program that can generate random files of any size and is extensible by plugins.


7 hours

$1,990

Discover jFileCrypt

About

jFileCrypt encrypts and decrypts files

jFileCrypt encrypts and decrypts files and directories fast and secure. It is written in Java 5 and uses the Java Cryptographic Extensions. It supports the following algorithms: Blowfish, DES, 3DES, AES and RC4.


7 hours

$1,990

Fundamentals of PCSecrets

About

Encrypt and manage secret text data

PCSecrets is a PC application that holds secret text data - protected by a master password and strong encryption. Use it as a password manager or just somewhere to hold any text data securely in one place. It can hold a second, hidden set of secrets that is undetectable and plausibly deniable. The program is also a PC counterpart of the Secrets for Android app. It uses the same data structure and provides synchronization that allows easy transfer of secrets between the two. For those who find the personal computer environment more comfortable for data entry and editing (i.e. a real keyboard), PCSecrets provides an alternative way to manage your secrets. Sync is also effectively a form of backup. To enable the sync feature with Secrets for Android, you need to install the PCSecrets sync app PCSSync, downloadable from SourceForge or Google Play. PCSecrets import plus PCSSync provides a route to importing secret data into Secrets for Android that would not otherwise be possible.


7 hours

$1,990

Work around with Barada

About

Barada (Barada Aint Respecting Any Deceptive Adversaries) is a PAM module designed to provide two-factor authentication support. There is companion software called Gort which runs on Android devices, essentially turning your phone into a SecureID token. The PAM module is available in the repositories for Debian based distributions. Gort, the Android client, is available from the android market (


7 hours

$1,990

Work around with Boot Integrity Services

About

Boot Integrity Services (BIS) is a CDSA application. BIS adds digital signatures to boot images obtained via PXE and DHCP/BOOTP protocols. BIS includes tools for creating keys, certificates, and digital signatures, and remotely configuring BIS clients.


7 hours

$1,990

Know Cryptography Playground

About

The best cryptography playground available

The best cryptography playground available Demo @ How to Install wget tar xvf crypto-installer.tar;cd crypto-installer ./bootstart.sh Browse


7 hours

$1,990

Basics of Dear Diary

About

Dear Diary is a password-protected text editor with features similar to WordPad that automatically encrypts the text before writing to disk. You can format text with different colors, fonts and font sizes as well as insert images into your documents.


7 hours

$1,990

Discover EasyVote Practical online voting

About

EasyVote is a new easy to use, secure and transparent cryptographic online voting scheme for small elections (up to 500 voters). The project contains the PHP files necessary to set up the server as well as the management tools.


7 hours

$1,990

Know HasherGUI

About

HashserGUI is a GUI interface for Jacksum. It is intended to provide a graphical tool to create hashes for files within a directory, and check the hashes generated. It works with many hash functions, as md5, sha1, sha256, sha512, md4, crc, etc.


7 hours

$1,990

Explore Mobile ID USAT applet

About

The Remarc Mobile-ID USAT applet

The Remarc Mobile-ID USAT applet this is a JavaCard applet with USIM Application Toolkit menu support. Basic functions of the Remarc Mobile-ID SAT applet: • Authentication function; • Signing function; • Changing PIN1/PIN2; • Changing PUK; • Unblock PIN1/PIN2; • View information - in a USAT menu is present a menu item with information of PIN usage.


7 hours

$1,990

Explore NeoCrypt File Protection Utility

About

NeoCrypt is a GUI-based file Encryption Utility for Windows. It helps you to protect your sensitive information easily by encrypting it with password(s).


7 hours

$1,990

Explore Passbook

About

Yet another Windows password manager, easy to learn and easy to use, no categorization, strong Blowfish encryption. There is no installation, just a single executable in a small package, no mess with the windows system registry.


7 hours

$1,990

Explore RSA Cryptographic Text Processor

About

Generate RSA key pairs of arbitrary length; convert text between formats or use keys to transform/crypt text. Supports decimal, hexadecimal, base64 and text input and output. Entirely ANSI C++; no external dependencies.


7 hours

$1,990

Work around with TACACS client library and PAM module

About

TACACS+ protocol client library and PAM module in C. This PAM module support authentication, authorization (account management) and accounting (session management)performed using TACACS+ protocol designed by Cisco.


7 hours

$1,990

Work around with jportablepass

About

Store several passwords with a single portable program. Just remember only one password. It's up to you to decide how many password you want to store, and which name you want to give to that password.


7 hours

$1,990

Learn shasummer

About

Shasummer is a SHA hashsum utility in Java. It can calculate SHA1, SHA256 and SHA512 hashes of a file or of a directory (and its subdirectories) and verify the hashes later. Shasummer has a graphical and a command-line interface.


7 hours

$1,990

Discover Inferno

About

Inferno is a simple and fast program that can securely delete files using the same methods as the U.S. Department of Defense. Inferno can also securely delete internet and windows history. Also it can even encrypt and decrypt your private files.


7 hours

$1,990

Fundamentals of DAR Disk ARchive

About

For full, incremental, compressed and encrypted backups or archives

DAR is a command-line backup and archiving tool that uses selective compression (not compressing already compressed files), strong encryption, may split an archive in different files of given size and provides on-fly hashing, supports differential backup with or without binary delta, ftp and sftp protocols to remote cloud storage Archive internal's catalog, allows very quick restoration even a single file from a huge, eventually sliced, compressed, encrypted archive eventually located on a remote cloud storage, by only reading/fetching the necessary data to perform the operation. Dar saves *all* UNIX inode types, takes care of hard links, sparse files as well as Extended Attributes (MacOS X file forks, Linux ACL, SELinux tags, user attributes) and some Filesystem Specific Attributes (Linux ext2/3/4, Mac OS X HFS+) more details at:


7 hours

$1,990

Work around with GnuPG for OSX

About

GnuPG 2.2.x Distribution for Mac OS X

This project provides the toolsets as well as full-featured releases of GnuPG 2.2.x for Mac OS X.


7 hours

$1,990

Work around with Fsum frontend

About

Fsum Frontend is a files integrity checker. It can calculate 96 hash and checksum algorithms(CRC32, MD5, SHA1, SHA2, ADLER, DHA256, FORK256, ...). You can verify your files using a .sfv/.md5/.sha1/.sha2 file or create your own checksum file.


7 hours

$1,990

Basics of md5deep and hashdeep

About

Recursively compute and match cryptographic hashes

Development of this project has been moved to . This site has been left for historical purposes ONLY. Please visit the GitHub site for current development. Computes the MD5, SHA-1, SHA-256, Tiger, or Whirlpool message digest for any number of files while optionally recursively digging through the directory structure. Can also match input files against lists of known hashes in a variety of formats.


7 hours

$1,990

Discover Keytool

About

Keytool is an Eclipse plugin that maintains keystores and certificates. It allows you to create certificates and put them in a keystore. You can from Eclipse, open and inspect certificates that are stored as .cer, or in a given keystore.


7 hours

$1,990

Explore IBM 39 s Software TPM 2 0

About

This project is an implementation of the TCG TPM 2.0 specification. It is based on the TPM specification Parts 3 and 4 source code donated by Microsoft, with additional files to complete the implementation. See the wiki for additional support - additions to the documentation. See the companion IBM TSS at


7 hours

$1,990

Learn duply simple duplicity

About

Duply is a shell front end for the duplicity backup tool . It simplifies the usage by implementing backup job profiles, batch commands and more. Secure backup to non-trusted file spaces made easy.


7 hours

$1,990

Discover Steganos LockNote

About

Store your most valuable notes in a LockNote. Hide your everyday notes in a safe place. Application and document in one: the mechanism to encrypt and decrypt a note is part of it. Secure, simple, independent. No installation required.


7 hours

$1,990

Explore Portable PGP

About

Portable PGP is a fully featured lightweight java based PGP tool. It allows to encrypt,decrypt,sign and verify text and files with a nice and absolutely straight graphical interface.


7 hours

$1,990

Work around with Aircrack ng Windows GUI

About

This is mainly just an interface tweak. Added function of mac address changer. If you have problems getting the mac changer to work, try using a mac address that starts with something other than "00" in the first octet. If you are intersted in learning about network security please check out my Juniper Networks training course at:


7 hours

$1,990

Fundamentals of SSLScan Fast SSL Scanner

About

SSLScan queries SSL services, such as HTTPS, in order to determine the ciphers that are supported. SSLScan is designed to be easy, lean and fast. The output includes prefered ciphers of the SSL service, the certificate and is in Text and XML formats.


7 hours

$1,990

Know SignServer

About

The SignServer is an application for server side signatures called by other systems. It is flexible and can be customized to specific needs. The SignServer have a ready to use TimeStamp server and signers for PDF, XML, ODF, PGP, OOXML and MRTD (ePassport DS).


7 hours

$1,990

Work around with FileVerifier

About

FileVerifier++ is a Windows utility for calculating hashes using a number of algorithms including CRC32, MD5, SHA-1, SHA-256/224/384/512, WHIRLPOOL, and RIPEMD-128/160/256/320. Supported hash file formats include MD5SUM .MD5, SFV, BSD CKSUM, and others.


7 hours

$1,990

Basics of Msieve

About

Msieve is a C library implementing a suite of algorithms to factor large integers. It contains an implementation of the SIQS and GNFS algorithms; the latter has helped complete some of the largest public factorizations known


7 hours

$1,990

Know Crypto

About

Crypto++ is a free C++ class library of cryptographic schemes originally written by Wei Dai. The library is now maintained by a community of volunteers. The Crypto++ website is located at and the source code is located at . The repository was moved in response to developer requests for Git access. The SourceForge site will remain in "read only" mode for historical purposes. You should visit the Crypto++ website at or GitHub at to view the latest news, download the latest source code, file bugs and request features. We thank SourceForge for hosting us through the years.


7 hours

$1,990

Fundamentals of iDecryptIt

About

iOS firmware tools

When you update your iDevice, iTunes downloads a firmware file. If you open up the firmware, you will find many small files along with one big one. That big one is the (encrypted) filesystem (i.e. the one that is installed on the device). If you use iDecryptIt on the file, iDecryptIt will decrypt it. The decrypted file can then be extracted with (the included) 7-Zip or mounted as a virtual hard drive with certain tools. ** Please do not contact me asking for keys. The keys provided by iDecryptIt are NOT my own work, but the contributors to The iPhone Wiki. ** Support for the other files contained in the firmware is coming.


7 hours

$1,990

Fundamentals of Android PasswordSafe

About

This is an Android front end for the PasswordSafe password management utility. This utility allows you to easily and securely manage multiple passwords, in a format that is compatible with the original PasswordSafe utility.


7 hours

$1,990

Fundamentals of ShredBitz

About

ShredBitz is a free and simple file shredder tool that can wipe selected files from any hard disk drive. ShredBitz is written in the java programming language and uses a custom written algorithm for shredding. ShredBitz is a very powerful tool.


7 hours

$1,990

Learn Simplebackup

About

Simplebackup is a cross-platform backup program. It reads a configuration file then builds a compress backup set, finally places the compressed files into another location (a directory, a remote http,ftp,sftp server or even one or more email accounts).


7 hours

$1,990

Learn Stream Shield Proxy Tunnel

About

Stream Shield is a program to encrypt and anonymize your connection to the internet by connecting to remote proxies, using Blowfish/Rijndael Algorithms and removing many personally identifiable headers such as referer, user-agent and more.


7 hours

$1,990

Learn moscrack

About

Moscrack is a perl application designed to facilitate cracking WPA keys on a cluster of computers. This is accomplished with any one of Mosix clustering software, ssh, rsh or Pyrit connectivity to nodes. Cluster nodes can run any Un*x variant (includ


7 hours

$1,990

Fundamentals of Caditor

About

Caditor is a portable tabbed text editor featuring encryption, syntax highlighting, autocomplete, line numbering and a functional plugin system.


7 hours

$1,990

Work around with CaesarCipher

About

CaesarCipher is a simple tool which helps you de/encrypt texts with the caesar cipher. This tool should not be used to encrypt sensitive data like passwords or personal information.


7 hours

$1,990

Know Gryptonite formerly GPassword Manager

About

Simple but Powerful, Cross-Platform Password Management Utility

A simple but powerful cross-platform utility for managing and accessing your most secret data. It stores passwords and whole files, so it can literally store any information you want to keep secret. Access your most-used passwords/URLs right out of a desktop tray icon. For advanced users, it includes a separate utility called Grypto-Transforms, which has a universal hash calculator with all the major hash functions, generic encrypt/decrypt functions and a base64/hex converter. Although the interface is simple and intuitive, the security is top-notch. It uses AES with CCM to secure and authenticate the data.


7 hours

$1,990

Discover Thoughts

About

Thoughts is an electronic journal/diary program based on the .NET framework (C#). It allows entries to be saved locally and/or remotely via web service or directly to a database. The entries can also be encrypted prior to saving.


7 hours

$1,990

Basics of VaultSync

About

Sync directories and files in a secure folder on an external drive

VaultSync keeps synchronised data backups from one or more computers in an encrypted vault that is locked with a password. It is optimised to operate on a flash or external drive with minimal installation but it can also work on a hosted storage system like Dropbox, One Drive or Google Drive. It is really important that a backup is simple and fast to make. There is no point in having to decide what files are important or what has changed at the time of the backup, or having to manually remove unimportant files from a deep folder hierarchy after a backup. VaultSync solves that problem. Give it a try and send a review whether you like it or not. It can't improve without feedback.


7 hours

$1,990

Fundamentals of VeraCryptMounter

About

VeracryptMounter is a tool to use Veracrypt encrypted drives and containers easier and faster. VeraCrypt is neede. This is only a wrapper for mounting. Changing from TrueCrypt to VeraCrypt. New Version is Released


7 hours

$1,990

Know WPACrackGUI

About

WPACrackGUI es un entorno gráfico de crackeo de redes WPA con john.

WPACrackGUI es un programa que mediante a la generación asistida de john puede crackear redes WPA sin ningún problema simplemente clickeando unas veces.


7 hours

$1,990

Basics of Web KeePass Password Safe

About

Web AND Mobile (Apple iPhone) based, multi user, java port of the KeePass project. A free, easy to use password manager which helps you to manage your passwords in a secure way. Focused on deep encryption and ease of use.


7 hours

$1,990

Explore basic key bruteforcer

About

A simple proof of concept brute forcer that depends on weak key systems depending on interest I might add more to make it more useful for things other then a reference


7 hours

$1,990

Work around with colombiana py

About

A recursive reverse hasher in python.

Colombiana is a tool used to recover, from given strings X and Y possible functions F : F(X) = Y. Very customisable, can recover a lot of functions.


7 hours

$1,990

Learn cryptHider

About

encFS qt wrapper, creates encrypted folder

It is a pure qt version of gtk-based cryptkeeper. It allows to create encrypted folders, mount them and import folders created by encFS utility. Program resides in system tray.


7 hours

$1,990

Discover cs ircd

About

This is an IRCd based off of bahamut-1.4.35 that includes IPv6 and SSL support. We will be adding more advanced features as well such as host hiding (+x), IRC operator levels, halfops support, more channel modes, etc.


7 hours

$1,990

Know ezCrypt

About

a tool used to hash, encrypt & decrypt files. it is integrated into the context menu of windows explorer.


7 hours

$1,990

Work around with Wordpie Python Based Brute Force

About

Python Based Brute Force Password Cracking Assistant By Clownsec

A python script used to generate all possible password combinations for cracking WAP and other logins or password files. This program is open source. If you see the need to repair or change something by all means do so, but share your findings. *HONK* Usage: wordpie.py [-h] [-o OUTPUT] [-min MIN_SIZE] [-max MAX_SIZE] [-N] [-L] [-U] [-S] [-A] [-v] Generate a wordlist with all possible combinations of letters including: -L (Lowercase Letters) -U (Uppercase Letters) -N (Numbers) -S (Special Characters) -A (All Characters, Numbers, and Letters) -min (Minimum Size) -max (Maximum Size) -o outputfile.gz or -o stdout By default -o filename.gz to create a GZ compressed text file of all the words. Use the keyword "stdout" to print to screen or for use with other programs like Aircrack-ng or Medusa ./wordpie.py | xargs -L 1 medusa -h 192.168.1.1 -u admin -M web-form -p ./wordpie.py -o stdout -A | aircrack-ng -b XX:XX:XX:XX:XX:XX -w - *.cap


7 hours

$1,990

Discover EverCrack GPL Cryptanalysis Engine

About

EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.


7 hours

$1,990

Basics of EIDAuthentication

About

Allow the use of ALL smart cards (including EID or DoD smart card) to logon on Windows Vista & later on stand alone computer. This solution doesn't need an Active Directory. Please look at the projet homepage to see a list of smart cards tested.


7 hours

$1,990

Work around with EGD Entropy Gathering Daemon

About

The Entropy Gathering Daemon is a portable perl script which provides a source of randomness on systems that lack an in-kernel /dev/random. GnuPG, OpenSSH, and the OpenSSL toolkit can use EGD to seed their random number generators.


7 hours

$1,990

Know HOFAT Hash Of File And Text

About

HOFAT - graphical Hash Of File And Text calculator, 100%-pure Java

HOFAT - graphical Hash Of File And Text calculator utility (Message Digest), 100%-pure Java, portable and cross-platform. Support md2, md5, sha1, sha256, sha384 and sha512 hashes. Simple and intuitive GUI - Graphical User Interface. Developed with Java Spring Framework. Tested in Windows/Linux. Need Jre-1.8 - . Source -


7 hours

$1,990

Basics of httpshell

About

httpshell is an interactive https command exploit to test the perimeter security of your network. This is a customized HTTPS encrypted reverse shell. It illustrates how easy to bypass any perimiter firewall and IPS by simply encrypting the data. To list all connecting clients: sulod -l To interact with existing client sessions: sulod -i <number> by Nelson Maligro


7 hours

$1,990

Work around with j com

About

j!com is a secure instant messaging system, featuring a classical AIM-like interface, and providing AES encryption for conversations and login.


7 hours

$1,990

Fundamentals of kokla

About

Simple tool for file encryption and folder content encryption with AES 256. Files can also be hashed with a SHA1 signature. A command line version is available as well as a GUI version. One other useful feature is to encrypt messages for emails.


7 hours

$1,990

Discover md5crkPHPGUI

About

md5crkPHPGUI is a PHP based graphical interface for md5crk clients (. It features live status updates, hardware info and user stats info.


7 hours

$1,990

Learn opacity

About

The Open Protocol for Access Control Identification and Ticketing with privacY, is a standard suite of Key Establishment and Authentication protocols based on ECC and AES, for optimized contactless transactions and simple PKI based Key management.


7 hours

$1,990

Fundamentals of openILP

About

OpenILP is a project to advance the participation of citizens in the democratic life of the country as an ALTERNATIVE to political means. This enables the digital signature legally recognized and advanced in eGovernment.


7 hours

$1,990

Explore openVPN Smart Configurator

About

OpenVPN Smart Configurator is an application for a complete configuration of openVPN 2.0 or later through an easy to use graphic user interface.


7 hours

$1,990

Work around with perfenc

About

Perfenc is a encryption program that encrypts/decrypts files or the standard input with a one-time pad. More information about one-time pads is available at


7 hours

$1,990

Explore qsecret

About

This is a little Software Project, which is able to decode the divine key from god which can be found in the Koran (Qu'ran). The Software further contains the book (as HTML) from the 6th Angel of the Apocalypse.


7 hours

$1,990

Basics of random Filesplitter

About

a smal tool tat can split a file into to files for encryption only both files can restore the orginal file


7 hours

$1,990

Fundamentals of simultaneous authentication of equals

About

SAE provides a secure password-based authentication mechanism for 802.11. It is resistant to passive attack, active attack, and dictionary attack.


7 hours

$1,990

Know yaSSL

About

yaSSL, or yet another SSL, is an embedded ssl library for programmers building security functionality into their applications and devices. yaSSL is highly portable, and runs on standard as well as embedded platforms(QNX, ThreadX, VxWorks, Tron) yaSSL is still available but no longer being developed. Current development on the same project continues under wolfSSL. Visit yaSSL Home above for the latest stable release.


7 hours

$1,990

Discover ZIPcrypt

About

Simple Encryption / Decryption Utility

ZIPcrypt is a simple encryption and compression software that uses patented XOTIC 512-bit+, or AES 256-bit encryption. Delivering the best encryption technology on the market today, ZIPcrypt was also designed to be fast, easy to use, and to work in parallel with the SCIFCOM Encryption as a Service website.


7 hours

$1,990

Basics of bcrypt blowfish file encryption

About

bcrypt is a lightweight blowfish file encryption utility which aims for cross-platform portability of not only the actual code, but the encrypted files as well. In addition to providing 448-bit encryption, bcrypt overwrites input files with random garbage


7 hours

$1,990

Know Steganography Studio

About

This project provides a steganography tool that allows to know, use and compare the results of current steganographic techniques. It also incorporates a comprehensive set of stegoanalitics methods for images.


7 hours

$1,990

Work around with mFileBinder

About

An advanced file binder which binds multiple file of any type

mFileBinder is an advanced file binder which binds multiple file of any type and merges into a single executable file. mFileBinder uses rijndael encryption algorithm to encrypt the file which can make Virus / Trojans Fully Undetectable. Set the drop location of all files and set the execution mode(Background,Foreground) of each file. Predefined set of ICON Package is included set your desired icon. Silently extracts and sequentially execute files.


7 hours

$1,990


Is learning Cryptography II hard?


In the field of Cryptography II learning from a live instructor-led and hand-on training courses would make a big difference as compared with watching a video learning materials. Participants must maintain focus and interact with the trainer for questions and concerns. In Qwikcourse, trainers and participants uses DaDesktop , a cloud desktop environment designed for instructors and students who wish to carry out interactive, hands-on training from distant physical locations.


Is Cryptography II a good field?


For now, there are tremendous work opportunities for various IT fields. Most of the courses in Cryptography II is a great source of IT learning with hands-on training and experience which could be a great contribution to your portfolio.



Cryptography II Online Courses, Cryptography II Training, Cryptography II Instructor-led, Cryptography II Live Trainer, Cryptography II Trainer, Cryptography II Online Lesson, Cryptography II Education