Last updated on September 8th, 2023 at 09:11 am
Enter the Cypher
Encryptdrop
We tried to reach the Encryptdrop owners, but their Site righteoustech.com is gone.Encryptdrop, as the name itself implies, is a program for encrypting and decryptipting files.
We saved the latest non-shareware version of this program (V9B), which still keeps different methods of encryption: Serpent, Twofish, Cast-256 and AES.
It’s a small powerful program for Win32 that makes it’s job perfectly and has a nice interface, also plays voices on different command types.
The Encryptdrop programmers never released it for Open Source.
Here is direct download of it, included a skin made by us for the interface.
EncryptDrop.Reloaded_eMule_Client_required_ [2.3 MB]
##########################
STEGHIDE
Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.
The current version is 0.5.1.
Features:
- compression of embedded data
- encryption of embedded data
- embedding of a checksum to verify the integrity of the extraced data
- support for JPEG, BMP, WAV and AU files
Steghide is licensed under the GNU General Public License (GPL) which permits modification and distribution of the program as long as these modifications are made available to the public under the GPL. For more information, see the full text of the GPL.
################################
SNOW
The program snow is used to conceal messages in ASCII text by appending whitespace to the end of lines. Because spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers. And if the built-in encryption is used, the message cannot be read even if it is detected.
What’s in a name?
Snow exploits the steganographic nature of whitespace. Locating trailing whitespace in text is like finding a polar bear in a snowstorm (which, by the way, explains the logo). And it uses the ICE encryption algorithm, so the name is thematically consistent.
######################################
Hydan [hI-dn]
Hydan is a steganography tool that allows users to conceal a message within an application. It does this by exploiting redundancy in the i386 instruction set, defining sets of functionally equivalent instructions, and encoding information in machine code using the appropriate instructions from each set. The application filesize remains unchanged, and the message is blowfish encrypted with a user-supplied passphrase before being embedded. The encoding rate is 1/110.
Hydan has several primary uses, including covert communication, signing, and watermarking. Covert communication involves embedding data into binaries to create a covert channel that can be used to exchange secret messages. Signing allows a program’s cryptographic signature to be embedded into itself, allowing the recipient of the binary to verify that it has not been tampered with and is really from who it claims to be from. Watermarking involves embedding a watermark to uniquely identify binaries for copyright purposes or as part of a DRM scheme. However, this usage is not recommended as Hydan implements fragile watermarks.
Hydan has been discussed in various online forums and publications, including Slashdot, Super User, and The NetBSD Packages Collection. It was developed by Rakan El-Khalil and takes advantage of redundancy in the i386 instruction set to insert hidden information by defining sets of functionally equivalent instructions. The program can hide approximately one message byte in every 110-instruction bytes and maintains the original size of the application file. Hydan is a unique tool that allows users to conceal messages in x86 binaries using semantic duals, making it an interesting option for those interested in steganography.
Platforms Supported:
- {Net, Free}BSD i386 ELF
- Linux i386 ELF
- Windows XP PE/COFF
Download:
########################################
CAMOUFLAGE
Camouflage allows you to hide files by scrambling them and then attaching them to the file of your choice. This camouflaged file then looks and behaves like a normal file, and can be stored, used or emailed without attracting attention.
For example, you could create a picture file that looks and behaves exactly like any other picture file but contains hidden encrypted files, or you could hide a file inside a Word document that would not attract attention if discovered. Such files can later be safely extracted.
For additional security you can password your camouflaged file. This password will be required when extracting the files within.
You can even camouflage files within camouflaged files.
Camouflage was written for use with Windows 95, Windows 98, Windows ME, Windows NT and Windows 2000, and is simple to install and use.