amaitou / Xorcry
Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given directory or file path. The XOR operation is executed using a user-defined key to encrypt the data.
☆19Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for Xorcry
- "TheJudgment," a captivating steganography challenge that will test your skills in uncovering hidden messages. Immerse yourself in a worl…☆17Updated 5 months ago
- This tool is a versatile implementation of the Affine Cipher, a classical encryption algorithm that combines modular arithmetic and linea…☆23Updated 3 months ago
- A potent tool designed for efficiently cracking MD5 hashes using an online wordlist. This repository provides a robust solution for secur…☆13Updated 3 months ago
- A Responsive Landing Page For A Restaurant☆17Updated 5 months ago
- Config file of my Github profile that comes as a description about Me, My Studies as well as the projects That I do☆18Updated 3 months ago
- DarkSpy facilitates a secure and educational environment to comprehend the mechanics of establishing connections between two machines. Th…☆44Updated 3 months ago
- HKG's Official Website☆34Updated 6 months ago
- Discover sorting algorithms and core data structures implemented in multiple languages in my repository. Perfect for beginners and experi…☆39Updated 2 months ago
- Landing Page For A Tv E-commerce Website☆37Updated 6 months ago
- Landing Page For Computers Repair Services Website☆13Updated 5 months ago
- Single-Page Application For An Educational Website☆50Updated 6 months ago
- Open Redirect scanner☆18Updated 2 years ago
- A tool that encrypt and hide your data inside your images.☆30Updated 3 years ago
- The Hacking Week☆2Updated 2 years ago
- some of my IOCs from malware investigations☆8Updated 2 years ago
- This project aims to introduce you to the wonderful world of virtualization.☆23Updated 2 years ago
- 42 header for neovim made with lua☆11Updated 2 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Updated last month
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Updated 3 years ago
- A really good cybersec reading materials.☆13Updated 2 years ago
- The Hack3r News B'darija☆18Updated last year
- ☆15Updated 2 years ago
- Ray-casting game for wasting productive time.☆11Updated 3 years ago
- Ressources for following my youtube C tutorials☆14Updated 3 years ago
- Reading a line from a fd is way too tedious☆1Updated last year
- This project aims to make you discover, through several little challenges, cyber security in various fields.☆13Updated 2 years ago