lsauer / entropyLinks
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆82Updated 6 years ago
Alternatives and similar repositories for entropy
Users that are interested in entropy are comparing it to the libraries listed below
Sorting:
- Database of private SSL/SSH keys for embedded devices☆267Updated last year
- Private keys that have become public ...☆184Updated this week
- ☆147Updated 9 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆46Updated 4 years ago
- Reveal encrypted files stored on a filesystem.☆54Updated 7 years ago
- A simple, but damn fast sinkhole☆65Updated 11 months ago
- The kernel patch and userspace tools to enable Linux software write blocking☆150Updated 5 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆207Updated 6 months ago
- BitErrant☆59Updated 8 years ago
- Threatbutt Suite☆37Updated 10 years ago
- similarity digest hashing tool☆174Updated 5 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 7 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆80Updated 6 years ago
- Password analysis software☆37Updated 10 years ago
- A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".☆13Updated 5 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 2 years ago
- An experimental file formats playground☆87Updated 2 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 9 months ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- Interrogate is a proof-of-concept tool for identification of cryptographic keys in binary material (regardless of target operating system…☆79Updated 6 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Updated 9 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆96Updated 9 months ago
- a grep -r for secrets☆178Updated 3 years ago
- ☆83Updated 3 years ago
- passe-partout is a tool to extract SSL private keys from process memory written by Nicolas Collignon and Jean-Baptiste Aviat (passe-parto…☆64Updated 7 years ago