lsauer / entropy
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆71Updated 5 years ago
Related projects: ⓘ
- ☆138Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆253Updated 7 months ago
- A simple, but damn fast sinkhole☆63Updated 2 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆140Updated 9 years ago
- Reveal encrypted files stored on a filesystem.☆51Updated 5 years ago
- Threatbutt Suite☆36Updated 9 years ago
- Transparent network tap☆115Updated 8 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- ☆52Updated this week
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆141Updated 4 years ago
- ☆27Updated this week
- Scripts to parse and analyze pgp key server data☆32Updated 4 years ago
- a low-interaction honeypot☆92Updated 7 years ago
- Private keys that have become public ...☆169Updated last month
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆49Updated 8 years ago
- ☆52Updated this week
- The kernel patch and userspace tools to enable Linux software write blocking☆133Updated 4 years ago
- free crypto audit☆31Updated 7 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆63Updated 9 years ago
- A boot record parser that identifies known good signatures for MBR, VBR and IPL.☆97Updated 6 years ago
- X41 Smartcard Fuzzer☆114Updated 5 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆41Updated 7 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 5 years ago
- similarity digest hashing tool☆164Updated 3 years ago
- Monitoring 'DNS' inside the Tor network☆91Updated 7 years ago
- a grep -r for secrets☆176Updated 2 years ago
- ZIP encryption info☆30Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Tools for timing attacks☆18Updated 8 years ago