cyphunk / entropy_examples
Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and gnuplot.
☆11Updated 10 years ago
Alternatives and similar repositories for entropy_examples:
Users that are interested in entropy_examples are comparing it to the libraries listed below
- Discover potential timestamps within the Windows Registry☆18Updated 10 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 8 years ago
- Be able to execute memory snapshots so they can start running where they left off.☆35Updated 9 years ago
- ☆15Updated 8 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- ☆17Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Find useful stuff in pastebin☆23Updated 11 years ago
- Here comes the paintrain!☆11Updated 8 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- ☆16Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Indicator of Compromise Mapping Service☆12Updated 10 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆24Updated 7 years ago
- NMAP Patches and NSE Scripts☆19Updated 11 years ago
- Run a windows process with many inputs and catch exit codes☆14Updated 9 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Updated 9 years ago
- Format string exploit generation☆10Updated 9 years ago
- Various pentest scripts☆14Updated 10 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- Burp extension for decoding WCF-gzipped requests.☆12Updated 9 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆22Updated 8 years ago
- Tools to work with vulnerability standards.☆19Updated 10 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Shellcodes for different usecases☆9Updated 8 years ago
- Automating LFI/RFI using Burp Proxy Logs and fimap☆13Updated 12 years ago
- PoC to append and extract data at the end of an ELF file☆20Updated 7 years ago
- NSA Playset implant for bridging airgaps without radio☆16Updated 9 years ago