This tool is used to identify encryption algorithms during reverse engineering analysis. The method is to test a list of encryption algorithms with parameters retrieved during the analysis: encrypted ...