jbremer / rc4Links
Python package for the RC4 algorithm
☆14Updated 8 years ago
Alternatives and similar repositories for rc4
Users that are interested in rc4 are comparing it to the libraries listed below
Sorting:
- Simple unpacking script for Ezuri ELF Crypter☆36Updated 4 years ago
- PEAnalyser is an open source PE file analysis tool.☆11Updated 5 years ago
- ☆24Updated 6 years ago
- Decoders for 7ev3n ransomware☆17Updated 9 years ago
- Print the strings of encoded printable characters in files☆12Updated 10 years ago
- Will try to put here slides from now on when I give a talk☆24Updated 4 years ago
- Cross-platform malware development library for anti-analysis techniques☆25Updated 4 years ago
- ☆34Updated 10 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Updated 8 years ago
- ☆36Updated 6 years ago
- Linux-KVM with rVMI extensions☆22Updated 8 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Updated 7 years ago
- xlrd2 is a variant of xlrd that is actively maintained☆23Updated last year
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Updated 5 years ago
- Rekall Memory Forensic Framework☆33Updated 6 years ago
- A simple useless rootkit for the linux kernel. It is a kernel module which hooks up the open() syscall (or potentially any syscall) to re…☆12Updated 9 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Updated 2 years ago
- ☆23Updated 4 years ago
- Debugger checks in 3 ways☆19Updated 8 years ago
- API hashing written in C to load APIs indirectly using CRC32 hashing☆15Updated 5 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- The Multiplatform Linux Sandbox☆16Updated 2 years ago
- My solutions for random crackmes and other challenges☆12Updated 6 years ago
- Zerokit shared code☆17Updated 6 years ago
- Dumping credentials through windbg and pykd☆41Updated 2 years ago
- Silent Cleanup UAC Bypass POC☆11Updated 6 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 5 years ago
- ☆12Updated 7 years ago
- Malware vulnerability research. Coming soon..☆12Updated 5 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆18Updated 12 years ago