BenH11235 / XORcismLinks
Command-line tool that breaks rotating-xor (and similar) ciphertexts
☆96Updated 4 months ago
Alternatives and similar repositories for XORcism
Users that are interested in XORcism are comparing it to the libraries listed below
Sorting:
- Full-bin indexation of binary files☆95Updated 7 years ago
- A fast Rust-based safe and thead-friendly grammar-based fuzz generator☆219Updated 4 years ago
- Binary (In)security tool☆25Updated last year
- AppJailLauncher in Rust☆111Updated 4 years ago
- A port of Kaitai to the Hiew hex editor☆151Updated 5 years ago
- RAIR: RAdare In Rust☆75Updated 10 months ago
- A novel technique to hide code from debuggers & disassemblers☆156Updated last year
- BONOMEN - Hunt for Malware Critical Process Impersonation☆49Updated 4 years ago
- Binary Ninja Posters☆35Updated 4 years ago
- Example code from "Programming Linux Anti-Reversing Techniques"☆99Updated 8 years ago
- Small Rust programs that do weird things☆30Updated 3 years ago
- Training Materials of Practical Reverse Engineering using Radare2☆107Updated 8 years ago
- grap: define and match graph patterns within binaries☆171Updated 4 years ago
- Synesthesia, implemented as Yices scripts☆94Updated 8 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆89Updated 6 years ago
- Implementation of the SMM rootkit "The Watcher"☆128Updated 3 years ago
- Join the REVEN community. Ask questions, talk about reverse engineering, discuss REVEN, and show off your work!☆13Updated 3 years ago
- Some Rust bindings for Binary Ninja☆30Updated last year
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- Just a modern packer for elf binaries ( works on linux executables only )☆41Updated 4 years ago
- Your bag of handy codes for malware researchers☆121Updated 5 years ago
- Classic code from 1999+ I am fairly sure this is the first public polymorphic shellcode ever (best IMHO and others http://ids.cs.columbia…☆90Updated last year
- ☆26Updated 5 years ago
- Pure Rust fuzzy hash implementation☆22Updated 2 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- ☆13Updated 5 years ago
- Format string exploitation helper☆45Updated 9 years ago
- A PyQt5 frontend to the binjatron plugin for Binary Ninja that includes highlighting features aimed at making it easier for beginners to …☆25Updated 7 years ago
- NASM Standard Library for shellcode☆69Updated 9 years ago
- CLI tool to analyze PE files☆88Updated 10 months ago