BenH11235 / XORcismLinks
Command-line tool that breaks rotating-xor (and similar) ciphertexts
☆98Updated 8 months ago
Alternatives and similar repositories for XORcism
Users that are interested in XORcism are comparing it to the libraries listed below
Sorting:
- Full-bin indexation of binary files☆95Updated 7 years ago
- BONOMEN - Hunt for Malware Critical Process Impersonation☆50Updated 5 years ago
- Binary (In)security tool☆25Updated last year
- A fast Rust-based safe and thead-friendly grammar-based fuzz generator☆221Updated 5 years ago
- A novel technique to hide code from debuggers & disassemblers☆159Updated last year
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- Pure Rust fuzzy hash implementation☆22Updated 2 years ago
- Small Rust programs that do weird things☆30Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- A port of Kaitai to the Hiew hex editor☆150Updated 5 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆93Updated last week
- a pstree mod that prints other helpful information and with added functionality☆25Updated 5 years ago
- Some Rust bindings for Binary Ninja☆31Updated 2 years ago
- Implementation of the SMM rootkit "The Watcher"☆129Updated 3 years ago
- ☆16Updated 5 years ago
- Binary Ninja Posters☆35Updated 5 years ago
- RAIR: RAdare In Rust☆75Updated last year
- AppJailLauncher in Rust☆108Updated 4 years ago
- A command line tool that resembles a debugger as well as Cheat Engine, to search for values in memory☆222Updated 3 years ago
- A small, fluid, low-interaction honeypot☆18Updated 6 years ago
- Format string exploitation helper☆46Updated 10 years ago
- List of real-world threats against endpoint protection software☆216Updated 2 weeks ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 2 years ago
- The first Linux hooking framework to allow merging two binary files into one!☆97Updated 6 months ago
- ☆101Updated 4 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 3 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 6 years ago
- ☆26Updated 5 years ago
- Your bag of handy codes for malware researchers☆121Updated 5 years ago