ThomasHabets / xor-analyze
Program for cryptanalyzing xor "encryption" with variable key length
☆44Updated 15 years ago
Alternatives and similar repositories for xor-analyze
Users that are interested in xor-analyze are comparing it to the libraries listed below
Sorting:
- ☆15Updated 8 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Updated 10 years ago
- ☆36Updated 12 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A short and small memory forensics helper.☆52Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 8 years ago
- Basic command line, text-based, shellcode debugger.☆91Updated 7 years ago
- Public resources NB shares☆18Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 11 years ago
- See here:☆42Updated 12 years ago
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 10 years ago
- tracy - a system call tracer and injector. Find us in #tracy on irc.freenode.net☆33Updated last year
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Test suite for bypassing Malware sandboxes.☆39Updated 10 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Swiss Army knife for raw bytes manipulation & interception☆56Updated 2 years ago
- Windows Crypt API hook to generate weak keys☆48Updated 8 years ago
- Shellcodes for different usecases☆9Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Utility to decompress Linux swsusp hibernation file.☆27Updated 3 years ago
- ☆27Updated 7 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51Updated 9 years ago
- Linux Runtime Process Injection Tool☆61Updated 12 years ago