AlexFSmirnov / xor-decryptLinks
A tool for decrypting the XOR cipher. It will find the key length and the key itself automatically.
☆24Updated last year
Alternatives and similar repositories for xor-decrypt
Users that are interested in xor-decrypt are comparing it to the libraries listed below
Sorting:
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆15Updated 4 years ago
- Nuevo Curso Completo de Exploiting con IDA Pro pro Ricardo Narvaja☆106Updated 7 years ago
- Advanced static analysis tool☆95Updated last month
- Do you want to use x64dbg instead of immunity debugger? oscp eCPPTv2 buffer overflow exploits pocs☆89Updated last year
- ☆101Updated 9 months ago
- SRE - Dissecting Malware for Static Analysis & the Complete Command-line Tool☆54Updated 6 months ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆25Updated 4 years ago
- Solutions to some crackmes that I have done.☆70Updated 2 years ago
- Hiew External Module (HEM) to calculate CRC-32, MD5, SHA-1, and SHA-256 hashes of a given file/block☆45Updated 7 months ago
- Various code samples and useful tips and tricks from reverse engineering and malware analysis fields.☆105Updated last month
- Code snippets for Reverse engineering training for xtraining platform☆32Updated 2 years ago
- How to set up 2 VirtualBox VM to debug kernel driver using windbg☆54Updated 3 years ago
- General malware analysis stuff☆37Updated 10 months ago
- Handy HxD plugin for various conversions like base64☆37Updated 4 years ago
- RIXED LABS is open for contributions for it's community papers . If you want to publish a blog or a paper , it will be added to the site…☆79Updated 2 years ago
- This is a Ghidra script that calls OPENAI to give meaning to decompiled functions☆129Updated 11 months ago
- MalUnpack companion driver☆98Updated last year
- This repository contains relevant samples and data related to "Malware Reverse Engineering for Beginners" articles.☆63Updated 3 years ago
- A PNG file-smuggling tool and library!☆25Updated 2 years ago
- A dynamic unpacking tool☆137Updated last year
- A collection of random crackme solutions created using Ghidra SRE (software Reverse Engineering) tool for purpose of research.☆29Updated 3 months ago
- This x64dbg plugin allows you to upload your sample to Malcore and view the results.☆37Updated 2 years ago
- API Logger for Windows Executables☆78Updated 4 years ago
- masm32 kernel programming, drivers, tutorials, examples, and tools (credits Four-F)☆124Updated last year
- ☆55Updated 3 years ago
- ☆133Updated 2 years ago
- This is a simple example of DLL hijacking enabling proxy execution.☆66Updated 2 years ago
- ☆138Updated 3 years ago
- Scripts to aid analysis of files obfuscated with ScatterBee.☆22Updated 2 years ago
- x64 Windows Exploit Development☆112Updated 11 months ago