lsauer / entropyLinks
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆83Updated 6 years ago
Alternatives and similar repositories for entropy
Users that are interested in entropy are comparing it to the libraries listed below
Sorting:
- The kernel patch and userspace tools to enable Linux software write blocking☆151Updated 5 years ago
- ☆147Updated 9 years ago
- Database of private SSL/SSH keys for embedded devices☆268Updated last year
- Reveal encrypted files stored on a filesystem.☆54Updated 7 years ago
- An experimental file formats playground☆87Updated 2 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆95Updated 10 months ago
- similarity digest hashing tool☆177Updated 5 years ago
- a grep -r for secrets☆178Updated 3 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆146Updated 10 years ago
- Private keys that have become public ...☆184Updated 3 weeks ago
- A simple, but damn fast sinkhole☆65Updated last year
- unarcrypto is an educational tool to depict cryptography usage in zip, rar and 7zip archives☆97Updated 7 years ago
- Threatbutt Suite☆37Updated 10 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆211Updated 7 months ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆90Updated 6 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆35Updated 6 years ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 2 years ago
- Crypto scanner☆43Updated 14 years ago
- Learn the very basics of different languages☆49Updated 8 months ago
- Security For Embedeed Systems - One Bin to Rule Them All.☆157Updated 6 years ago
- Visual reverse engineering tool.☆283Updated 8 years ago
- BitErrant☆59Updated 8 years ago
- Auxiliary documentation and scripts around "A Reasonably Safe Travel Burner Laptop"☆242Updated 2 months ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated 2 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆46Updated 4 years ago
- Password analysis software☆37Updated 10 years ago
- Install script for grsecurity for Debian environments☆59Updated 10 years ago
- A honeypot for malware that propagates via USB storage devices☆101Updated 10 years ago
- Transparent network tap☆120Updated 10 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆144Updated 5 years ago