lsauer / entropy
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆74Updated 5 years ago
Alternatives and similar repositories for entropy:
Users that are interested in entropy are comparing it to the libraries listed below
- ☆141Updated 8 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- A simple, but damn fast sinkhole☆64Updated 4 months ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆45Updated 4 years ago
- Database of private SSL/SSH keys for embedded devices☆257Updated last year
- A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".☆13Updated 4 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆88Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- Private keys that have become public ...☆174Updated this week
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- ☆36Updated 12 years ago
- ☆30Updated 13 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Transparent network tap☆116Updated 9 years ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated last year
- Rogue AP killer☆89Updated 7 years ago
- Threatbutt Suite☆37Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago
- IPv6 network walking utilities (ip6dnswalk, ip6dnshide)☆22Updated 10 years ago
- Crypto scanner☆43Updated 14 years ago
- Full-bin indexation of binary files☆95Updated 6 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 4 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆142Updated 4 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆84Updated 4 years ago
- ☆48Updated 2 weeks ago