3NCrypt10n Programs


3ncrypt10n Programs

We tried to reach the Encryptdrop owners, but their Site righteoustech.com is gone.
Encryptdrop, as the name itself implies, is a program for encrypting and decryptipting files.
We saved the latest non-shareware version of this program (V9B),
which still keeps different methods of encryption, for example: Serpent, Twofish, Cast-256 and AES.
It’s a small powerful program for Win32 that makes it’s job perfectly and has a nice interface.
The Encryptdrop programmers never released it for Open Source,
we just hope that they change their mind and continue the development of this program.
Here is direct download of it and a skin made by us for the interface included.

ed2kEncryptDrop.Reloaded_eMule_Client_required_ [2.3 MB]


Steghide is a steganography program that is able to hide data in various kinds of image- and audio-files. The color- respectivly sample-frequencies are not changed thus making the embedding resistant against first-order statistical tests.

The current version is 0.5.1.


  • compression of embedded data
  • encryption of embedded data
  • embedding of a checksum to verify the integrity of the extraced data
  • support for JPEG, BMP, WAV and AU files

Steghide is licensed under the GNU General Public License (GPL) which permits modification and distribution of the program as long as these modifications are made available to the public under the GPL. For more information, see the full text of the GPL.



The program snow is used to conceal messages in ASCII text by appending whitespace to the end of lines. Because spaces and tabs are generally not visible in text viewers, the message is effectively hidden from casual observers. And if the built-in encryption is used, the message cannot be read even if it is detected.

What’s in a name?

Snow exploits the steganographic nature of whitespace. Locating trailing whitespace in text is like finding a polar bear in a snowstorm (which, by the way, explains the logo). And it uses the ICE encryption algorithm, so the name is thematically consistent.


>Hydan [hI-dn] :

Hydan steganographically conceals a message into an
application. It exploits redundancy in the i386 instruction
set by defining sets of functionally equivalent instructions.
It then encodes information in machine code by using the
appropriate instructions from each set.


– Application filesize remains unchanged
– Message is blowfish encrypted with a user-supplied
passphrase before being embedded
– Encoding rate: 1/110

Primary uses for Hydan:

Covert Communication: embedding data into binaries
creates a covert channel that can be used to
exchange secret messages.

Signing: a program’s cryptographic signature can
be embedded into itself. The recipient of the
binary can then verify that it has not been
tampered with (virus or trojan), and is really
from who it claims to be from. This check can be
built into the OS for user transparency.

Watermarking: a watermark can be embedded to
uniquely identify binaries for copyright purposes,
or as part of a DRM scheme. Note: this usage is not
recommended as Hydan implements fragile watermarks.

If you think of anything else, do let me know :)

Platforms Supported:

– {Net, Free}BSD i386 ELF
– Linux i386 ELF
– Windows XP PE/COFF


Version 0.13


Camouflage allows you to hide files by scrambling them and then attaching them to the file of your choice. This camouflaged file then looks and behaves like a normal file, and can be stored, used or emailed without attracting attention.

For example, you could create a picture file that looks and behaves exactly like any other picture file but contains hidden encrypted files, or you could hide a file inside a Word document that would not attract attention if discovered. Such files can later be safely extracted.

For additional security you can password your camouflaged file. This password will be required when extracting the files within.
You can even camouflage files within camouflaged files.

Camouflage was written for use with Windows 95, Windows 98, Windows ME, Windows NT and Windows 2000, and is simple to install and use.


This site uses Akismet to reduce spam. Learn how your comment data is processed.

Do NOT follow this link or you will be banned from the site!
%d bloggers like this: