ikizir / HohhaDynamicXORLinks
Hohha Dynamic XOR Encryption Algorithm
☆54Updated 5 years ago
Alternatives and similar repositories for HohhaDynamicXOR
Users that are interested in HohhaDynamicXOR are comparing it to the libraries listed below
Sorting:
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- The "Intel x86 considered harmful" paper☆197Updated 9 years ago
- Open Database of Firmware Test Results☆150Updated 9 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 8 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆97Updated 8 years ago
- Fully implemented dlclose exploit for PS4 fw 1.76 with included linux loader☆101Updated 9 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Detect snooper on your system!☆84Updated 8 years ago
- 60 artisanal compiler crashes☆39Updated 8 years ago
- A set of PS4 experiments using the WebKit exploit☆83Updated 9 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- NASM Standard Library for shellcode☆69Updated 8 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Pretty Curved Privacy☆122Updated 7 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆253Updated 6 years ago
- ☆86Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 10 years ago
- HTTP framework☆48Updated 7 years ago
- PaX exception daemon - Temporarily abandoned due to the PaX and grsecurity patches becoming private☆40Updated 8 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- The best-effort C/C++ error steamrolloer.☆59Updated 10 years ago
- The world's first Linux white-box ransomware☆63Updated 7 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- ☆287Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Snowman decompiler☆107Updated 7 years ago