lsauer / entropyLinks
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆83Updated 6 years ago
Alternatives and similar repositories for entropy
Users that are interested in entropy are comparing it to the libraries listed below
Sorting:
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- similarity digest hashing tool☆177Updated 5 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆242Updated 2 months ago
- The kernel patch and userspace tools to enable Linux software write blocking☆151Updated 5 years ago
- Private keys that have become public ...☆184Updated this week
- A simple, but damn fast sinkhole☆65Updated last week
- Crypto scanner☆43Updated 14 years ago
- ☆148Updated 9 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆47Updated 5 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆210Updated 8 months ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- Threatbutt Suite☆37Updated 10 years ago
- Visual reverse engineering tool.☆283Updated 8 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- Transparent network tap☆120Updated 10 years ago
- for the louise☆245Updated 5 years ago
- Reveal encrypted files stored on a filesystem.☆53Updated 7 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆95Updated 10 months ago
- A honeypot for malware that propagates via USB storage devices☆102Updated 10 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 3 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated 2 years ago
- Runtime Process Infection Made Easy☆187Updated last year
- ip6.arpa scanner☆32Updated 9 years ago
- Learn the very basics of different languages☆49Updated 8 months ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago