lsauer / entropy
ent is a small, fast command line utility, plotting various entropy related metrics of files or pipe/stdin streams
☆72Updated 5 years ago
Alternatives and similar repositories for entropy:
Users that are interested in entropy are comparing it to the libraries listed below
- ☆140Updated 8 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆44Updated 4 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆141Updated 4 years ago
- Threatbutt Suite☆37Updated 9 years ago
- The kernel patch and userspace tools to enable Linux software write blocking☆139Updated 4 years ago
- Reveal encrypted files stored on a filesystem.☆52Updated 6 years ago
- a low-interaction honeypot☆94Updated 7 years ago
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆86Updated 6 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- An experimental file formats playground☆86Updated last year
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- A simple, but damn fast sinkhole☆64Updated 2 months ago
- Database of private SSL/SSH keys for embedded devices☆256Updated last year
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- A simple cryptosystem that provides provable plausibly deniable encryption.☆87Updated 6 years ago
- Private keys that have become public ...☆173Updated this week
- Volatility plugin to extract FileVault 2 VMK's☆50Updated 3 years ago
- Transparent network tap☆116Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 6 years ago
- Phraser is a phrase generator using n-grams and Markov chains to generate phrases for passphrase cracking. The generated phraselists can …☆51Updated 9 years ago
- free crypto audit☆31Updated 7 years ago
- Scripts to parse and analyze pgp key server data☆33Updated 4 years ago
- Stop searching for sample hashes on 10 different sites.☆66Updated 6 years ago
- Cryptowall Tooling & Information☆34Updated 8 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- ☆46Updated 7 years ago
- A browsable archive of all Underhanded Crypto Contest entries.☆34Updated 5 years ago
- A binary rainfall visualizer for packet captures. Idea taken from Greg Conti's "Security Data Visualization".☆13Updated 4 years ago
- A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes☆141Updated 9 years ago
- Rapid deployment of Windows environment (files, registry keys, mutex etc) to facilitate malware analysis☆42Updated 9 years ago