lsauer / entropyLinks
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆77Updated 6 years ago
Alternatives and similar repositories for entropy
Users that are interested in entropy are comparing it to the libraries listed below
Sorting:
- Database of private SSL/SSH keys for embedded devices☆261Updated last year
- The kernel patch and userspace tools to enable Linux software write blocking☆142Updated 5 years ago
- Private keys that have become public ...☆178Updated 3 months ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆45Updated 4 years ago
- Crypto scanner☆43Updated 14 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆196Updated 2 months ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆52Updated 9 years ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- ☆143Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- similarity digest hashing tool☆169Updated 4 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆98Updated 5 months ago
- A honeypot for malware that propagates via USB storage devices☆97Updated 10 years ago
- A simple, but damn fast sinkhole☆64Updated 7 months ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆89Updated 6 years ago
- Learn the very basics of different languages☆48Updated 3 months ago
- BitErrant☆58Updated 8 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆143Updated 5 years ago
- Transparent network tap☆118Updated 9 years ago
- ☆48Updated 2 weeks ago
- This is a simple utility for enumerating D-Bus endpoints, an nmap for D-Bus.☆78Updated 5 years ago
- ☆36Updated 12 years ago
- scripts, etc...☆37Updated last year
- Runtime Process Infection Made Easy☆186Updated last year
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆53Updated 8 years ago
- a grep -r for secrets☆178Updated 3 years ago
- An experimental file formats playground☆86Updated 2 years ago
- ☆138Updated 7 years ago