BenH11235 / XORcismView external linksLinks
Command-line tool that breaks rotating-xor (and similar) ciphertexts
☆99Mar 17, 2025Updated 10 months ago
Alternatives and similar repositories for XORcism
Users that are interested in XORcism are comparing it to the libraries listed below
Sorting:
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- A fast web services mass scanner 🕵🏻♂️☆54Jun 4, 2021Updated 4 years ago
- A Mobicore Trustlet/Driver Binary Loader for Ghidra☆13Jul 10, 2019Updated 6 years ago
- A tool to help malware analysts signature unique parts of RTF documents☆29Jan 5, 2026Updated last month
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- pArAnoIA - Tiny "Secure" Browser☆12Nov 2, 2024Updated last year
- A simple tool to convert network traffic directly into sound.☆14Aug 29, 2023Updated 2 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- ☆28Jun 10, 2016Updated 9 years ago
- ☆12Sep 22, 2018Updated 7 years ago
- Prototype program to decode a video file looking for exploits/malware.☆17Jul 26, 2020Updated 5 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Show the marketplace profile from FB☆14May 4, 2022Updated 3 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- File serving using tower web☆19Feb 3, 2019Updated 7 years ago
- Subgraph pH☆14Jun 16, 2022Updated 3 years ago
- Quick script to check for plagiarism between two documents☆16Nov 22, 2020Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- Scripts for ElasticSearch vulns☆13Oct 17, 2015Updated 10 years ago
- ☆41Oct 24, 2022Updated 3 years ago
- I used this to see if an EDR is running in Safe Mode☆36Feb 13, 2021Updated 5 years ago
- Quick and dirty python script to generate mutual SSL certificates and configuration files to quickly configure OpenVPN☆19Apr 20, 2016Updated 9 years ago
- Plain Rust implementations of basic machine learning algorithms☆17Mar 13, 2019Updated 6 years ago
- A simplistic parsing library in Rust☆20Mar 22, 2020Updated 5 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- A Programming language of directories. Just for fun.☆15Feb 2, 2023Updated 3 years ago
- Responder for Python3☆100Aug 15, 2019Updated 6 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆22Jan 8, 2026Updated last month
- ☆24Mar 19, 2018Updated 7 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆17Dec 9, 2017Updated 8 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- TA505 unpacker Python 2.7☆47Jun 22, 2020Updated 5 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Aug 2, 2023Updated 2 years ago