BenH11235 / XORcism
Command-line tool that breaks rotating-xor (and similar) ciphertexts
☆95Updated 3 years ago
Alternatives and similar repositories for XORcism:
Users that are interested in XORcism are comparing it to the libraries listed below
- Full-bin indexation of binary files☆95Updated 6 years ago
- Pure Rust fuzzy hash implementation☆21Updated last year
- Small Rust programs that do weird things☆27Updated 2 years ago
- RAIR: RAdare In Rust☆74Updated 4 months ago
- Binary (In)security tool☆24Updated 8 months ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆87Updated last year
- A fast Rust-based safe and thead-friendly grammar-based fuzz generator☆217Updated 4 years ago
- Bunch of techniques potentially used by malware to detect analysis environments☆157Updated 8 years ago
- capa explorer for Cutter.☆43Updated 3 years ago
- A novel technique to hide code from debuggers & disassemblers☆154Updated 6 months ago
- Synesthesia, implemented as Yices scripts☆92Updated 7 years ago
- grap: define and match graph patterns within binaries☆170Updated 3 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Some Rust bindings for Binary Ninja☆30Updated last year
- Apply YARA rules to your Cutter projects.☆16Updated 5 years ago
- A command line tool that resembles a debugger as well as Cheat Engine, to search for values in memory☆219Updated 2 years ago
- Linkable sandbox explorer☆78Updated 3 weeks ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago
- Rust crate for r2pipe☆47Updated last year
- realtime cross-tool collaborative reverse engineering☆99Updated 2 years ago
- intel x86(-64) code analysis library that reconstructs control flow☆103Updated 2 months ago
- Fast defcon 26 quals pow solver☆25Updated 6 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- ☆25Updated 5 years ago
- Command line tool to generate crafty homograph strings.☆35Updated 3 years ago
- Demonstrate ability to read memfd_secret() data from the kernel☆58Updated last year
- A one-click tool to inject jobs into the BITS queue (Background Intelligent Transfer Service), allowing arbitrary program execution as th…☆98Updated 5 years ago
- Your bag of handy codes for malware researchers☆121Updated 4 years ago
- ☆74Updated 4 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago