lsauer / entropy
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆73Updated 5 years ago
Alternatives and similar repositories for entropy:
Users that are interested in entropy are comparing it to the libraries listed below
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆44Updated 4 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆97Updated last month
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆142Updated 9 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- ☆48Updated 2 weeks ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆142Updated 4 years ago
- Threatbutt Suite☆37Updated 9 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- Origami is a Ruby framework designed to parse, analyze, and forge PDF documents.☆49Updated 11 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Crypto scanner☆43Updated 14 years ago
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- Transparent network tap☆116Updated 9 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- POLAR☆73Updated 6 years ago
- Basic command line, text-based, shellcode debugger.☆92Updated 7 years ago
- The kernel patch and userspace tools to enable Linux software write blocking☆139Updated 4 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆85Updated 7 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- A simple, but damn fast sinkhole☆64Updated 3 months ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆49Updated 8 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- free crypto audit☆31Updated 7 years ago
- Tools for attacking cryptographic implementations.☆21Updated 8 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆42Updated 10 years ago