lsauer / entropy
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆75Updated 6 years ago
Alternatives and similar repositories for entropy
Users that are interested in entropy are comparing it to the libraries listed below
Sorting:
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆45Updated 4 years ago
- a low-interaction honeypot☆93Updated 7 years ago
- Private keys that have become public ...☆175Updated 3 weeks ago
- Threatbutt Suite☆37Updated 9 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆142Updated 5 years ago
- A simple, but damn fast sinkhole☆64Updated 5 months ago
- ☆142Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆258Updated last year
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- a grep -r for secrets☆179Updated 3 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☆30Updated 13 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆144Updated 9 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 4 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Transparent network tap☆117Updated 9 years ago
- ☆36Updated 12 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆141Updated 10 years ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆98Updated 3 months ago
- Crypto scanner☆43Updated 14 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 7 years ago
- POLAR☆73Updated 6 years ago
- unhash is a set of tools designed to enable better password auditing☆119Updated 2 years ago
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 6 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- YALIH (Yet Another Low Interaction Honeyclient) is a low Interaction Client honeypot designed to detect malicious websites through signat…☆68Updated 5 years ago