ikizir / HohhaDynamicXORLinks
Hohha Dynamic XOR Encryption Algorithm
☆55Updated 6 years ago
Alternatives and similar repositories for HohhaDynamicXOR
Users that are interested in HohhaDynamicXOR are comparing it to the libraries listed below
Sorting:
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆118Updated 8 years ago
- This project contains a PoC and exploit generator for a code execution bug in Ubuntu's Apport crash reporter☆95Updated 9 years ago
- The "Intel x86 considered harmful" paper☆200Updated 10 years ago
- HTTP framework☆48Updated 8 years ago
- ASM Malicious code - PE infector☆71Updated 8 years ago
- Cross compiling Utils (ARMEB, ARMEL, MIPS, MIPSEL)☆80Updated 8 years ago
- NASM Standard Library for shellcode☆69Updated 9 years ago
- The world's first Linux white-box ransomware☆64Updated 7 years ago
- A public database for software and firmware hashes☆215Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Here's a quick rundown of how I reversed the Casper API (https://casper.io)☆58Updated 8 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆62Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆240Updated 8 years ago
- Multiple radare2 rpipe scripts☆61Updated 8 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- ☆288Updated 9 years ago
- Universal script packer-- transforms any type of script into a protected ELF executable, encrypted with anti-debugging.☆105Updated 11 years ago
- Tools for attacking cryptographic implementations.☆21Updated 9 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 10 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆39Updated 10 years ago
- Blogging about reversing "script kiddie" style malware.☆97Updated 10 years ago
- Diary of a reverse-engineer☆39Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- a MITM attack tool☆85Updated 10 years ago
- Integrity checking script for Apple Thunderbolt to Ethernet adapters, to check for attacks similar to Thunderstrike 2☆26Updated 10 years ago