lsauer / entropyLinks
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆80Updated 6 years ago
Alternatives and similar repositories for entropy
Users that are interested in entropy are comparing it to the libraries listed below
Sorting:
- The kernel patch and userspace tools to enable Linux software write blocking☆148Updated 5 years ago
- similarity digest hashing tool☆173Updated 5 years ago
- Database of private SSL/SSH keys for embedded devices☆267Updated last year
- Crypto scanner☆43Updated 14 years ago
- A simple, but damn fast sinkhole☆65Updated 10 months ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆202Updated 6 months ago
- ☆146Updated 9 years ago
- Transparent network tap☆119Updated 10 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Private keys that have become public ...☆184Updated this week
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆46Updated 4 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆96Updated 8 months ago
- a low-interaction honeypot☆94Updated 8 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- A honeypot for malware that propagates via USB storage devices☆99Updated 10 years ago
- Reveal encrypted files stored on a filesystem.☆54Updated 6 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆239Updated 2 weeks ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 6 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆145Updated 10 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Password analysis software☆37Updated 10 years ago
- Checks with NSRL RDS servers looking for for hash matches☆114Updated 4 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆144Updated 5 years ago
- Volatility plugin to extract FileVault 2 VMK's☆51Updated 4 years ago
- a grep -r for secrets☆178Updated 3 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆310Updated 11 years ago
- A collection of Hack The Planet's zines.☆71Updated 9 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago