ShawnDEvans / xorpyView external linksLinks
Stupid simple XOR encryption utility
☆34Oct 3, 2025Updated 4 months ago
Alternatives and similar repositories for xorpy
Users that are interested in xorpy are comparing it to the libraries listed below
Sorting:
- OCL Hashcat username to decrypted password recombiner☆15May 21, 2015Updated 10 years ago
- a simple Makefile template for small-medium C/C++ projects☆14Jul 26, 2016Updated 9 years ago
- sqlmap tamper script for unicode escape inside json☆14Dec 20, 2018Updated 7 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- CTF Writeups☆10Nov 7, 2016Updated 9 years ago
- PoC Reverse Text segment ELF File infector☆14Feb 28, 2020Updated 5 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- A library to bring the joys of non-systemd users to systemd users☆26Oct 31, 2017Updated 8 years ago
- Linux assembly programs☆17Updated this week
- Tools and library to manipulate EFI variables.☆10Jan 16, 2026Updated 3 weeks ago
- Helps defenders find their WSUS configurations in the wake of CVE-2025-59287☆46Oct 28, 2025Updated 3 months ago
- Learning a bit of assembly programming☆13Mar 23, 2015Updated 10 years ago
- Compute memory usage of a piece of software with strace.☆11Sep 17, 2019Updated 6 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Apr 19, 2017Updated 8 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Python scripts for gdb, reverse engineering oriented☆16Sep 20, 2016Updated 9 years ago
- CVE-2024-23897 jenkins-cli☆15Jan 27, 2024Updated 2 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- It is a very simple dns-sniffer made using scapy...It can be used with ettercap to see all the queries over the network.☆19Nov 24, 2013Updated 12 years ago
- rename☆19Jul 19, 2017Updated 8 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 6 months ago
- ZYTOKINE STORM is a user-mode Linux binary translation layer targeting Darwin☆16Mar 22, 2015Updated 10 years ago
- Nim Shellcode Injector☆15Jan 24, 2021Updated 5 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Sep 12, 2019Updated 6 years ago
- This project has been done with Chen as part of system security course at SBU CS.☆12Dec 14, 2014Updated 11 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆24Dec 31, 2017Updated 8 years ago
- ☆15Apr 9, 2018Updated 7 years ago
- Locates installed Perl modules.☆22Apr 16, 2023Updated 2 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Aug 23, 2019Updated 6 years ago
- A utility to dump memory of unixy processes☆18Apr 5, 2022Updated 3 years ago
- collateral from http://basicinputoutput.com☆15Feb 15, 2023Updated 3 years ago