AlexFSmirnov / xor-decryptLinks
A tool for decrypting the XOR cipher. It will find the key length and the key itself automatically.
☆27Updated 2 years ago
Alternatives and similar repositories for xor-decrypt
Users that are interested in xor-decrypt are comparing it to the libraries listed below
Sorting:
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆91Updated 2 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Updated 4 years ago
- ☆140Updated 4 years ago
- Code snippets for Reverse engineering training for xtraining platform☆34Updated 3 years ago
- A PNG file-smuggling tool and library!☆26Updated 2 years ago
- Solutions to some crackmes that I have done.☆71Updated 3 years ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆106Updated 8 months ago
- ☆59Updated 4 years ago
- ☆81Updated 8 years ago
- ☆111Updated last month
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆57Updated 3 years ago
- A curated list of awesome Windows Exploitation resources, and shiny things.☆85Updated 8 years ago
- x64 Windows Exploit Development☆116Updated last year
- ARM64 macOS assembly program for null-byte free shellcode☆107Updated 8 months ago
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆128Updated 2 years ago
- This repository contains writeups for various CTFs I've participated in (Including Hack The Box).☆155Updated 2 months ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆80Updated 3 years ago
- A personal collection of Windows CVE I have turned in to exploit source, as well as a collection of payloads I've written to be used in c…☆123Updated 3 years ago
- 0xpat blog☆109Updated 4 years ago
- gdb cheat sheet☆25Updated 5 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆44Updated last year
- ☆53Updated 2 years ago
- ☆14Updated 6 years ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆57Updated last year
- Linux process injection PoCs☆29Updated last year
- A curated list of resources for the OSED journey.☆72Updated 4 years ago
- Nuevo Curso Completo de Exploiting con IDA Pro pro Ricardo Narvaja☆108Updated 7 years ago
- A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.☆34Updated 9 months ago