lsauer / entropyLinks
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆83Updated 6 years ago
Alternatives and similar repositories for entropy
Users that are interested in entropy are comparing it to the libraries listed below
Sorting:
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- The kernel patch and userspace tools to enable Linux software write blocking☆151Updated 5 years ago
- A simple, but damn fast sinkhole☆65Updated last month
- An experimental file formats playground☆88Updated 2 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆211Updated 8 months ago
- similarity digest hashing tool☆177Updated 5 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆95Updated 11 months ago
- Private keys that have become public ...☆184Updated 3 weeks ago
- Crypto scanner☆43Updated 14 years ago
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 7 years ago
- A honeypot for malware that propagates via USB storage devices☆102Updated 10 years ago
- Threatbutt Suite☆37Updated 10 years ago
- Reveal encrypted files stored on a filesystem.☆53Updated 7 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Updated 10 years ago
- AM radio data exfiltration with CPU cache in assembly☆20Updated 2 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆47Updated 5 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Transparent network tap☆122Updated 10 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 10 years ago
- ☆148Updated 9 years ago
- BitErrant☆59Updated 8 years ago
- a grep -r for secrets☆179Updated 3 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 11 years ago
- Visual reverse engineering tool.☆284Updated 9 years ago
- Password analysis software☆37Updated 10 years ago
- The Official Github Repository of Daemonlogger☆22Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago