amaitou / XorcryLinks
Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given directory or file path. The XOR operation is executed using a user-defined key to encrypt the data.
☆20Updated 11 months ago
Alternatives and similar repositories for Xorcry
Users that are interested in Xorcry are comparing it to the libraries listed below
Sorting:
- This tool is a versatile implementation of the Affine Cipher, a classical encryption algorithm that combines modular arithmetic and linea…☆23Updated 11 months ago
- A potent tool designed for efficiently cracking MD5 hashes using an online wordlist. This repository provides a robust solution for secur…☆13Updated 11 months ago
- "TheJudgment," a captivating steganography challenge that will test your skills in uncovering hidden messages. Immerse yourself in a worl…☆17Updated last year
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Th…☆48Updated 11 months ago
- A Responsive Landing Page For A Restaurant☆17Updated last year
- Config file of my Github profile that comes as a description about Me, My Studies as well as the projects That I do☆18Updated last month
- HKG's Official Website☆34Updated last year
- Discover sorting algorithms and core data structures implemented in multiple languages in my repository. Perfect for beginners and experi…☆41Updated 10 months ago
- Landing Page For A Tv E-commerce Website☆37Updated last year
- Landing Page For Computers Repair Services Website☆14Updated last year
- This repository consists of 1337/42 Pool as well as the submodules of each 42 project that I have made, check the repository for more inf…☆9Updated 6 months ago
- Open Redirect scanner☆18Updated 3 years ago
- Single-Page Application For An Educational Website☆52Updated last year
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- Ressources for following my youtube C tutorials☆13Updated 4 years ago
- The Hacking Week☆2Updated 2 years ago
- Restful Api developed with Flask using Prometheus and Grafana for monitoring and containerization with Docker☆17Updated last year
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Updated 3 years ago
- Ray-casting game for wasting productive time.☆11Updated 4 years ago
- The Hack3r News B'darija☆18Updated 2 years ago
- 42 header for neovim made with lua☆11Updated 2 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Updated 9 months ago
- A really good cybersec reading materials.☆13Updated 2 years ago
- ☆15Updated 2 years ago
- Boilerplate to Setup Authentication using Django-all auth 🚀☆14Updated 3 years ago
- Piscine 1337 futureisloading-Juillet 2018☆27Updated 6 years ago
- Reading a line from a fd is way too tedious☆1Updated 2 years ago
- Practice typing and improve your typing speed (WPM).☆10Updated 4 years ago
- Network Shredder IDS☆11Updated 10 months ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago