mstrand / xcat
XOR cat - a command line tool to XOR a data stream with a given key
☆35Updated 12 years ago
Alternatives and similar repositories for xcat:
Users that are interested in xcat are comparing it to the libraries listed below
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆24Updated 2 years ago
- Nyancat in the MBR☆121Updated 12 years ago
- Binary Protocol Differ☆118Updated 4 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆49Updated 8 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- Repository containing many useful scripts☆74Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- SSL certificate cloner☆13Updated 7 years ago
- proof-of-concept tty hijacking via TIOCSTI or TIOCLINUX☆35Updated this week
- A stealthy ELF loader - no files, no execve, no RWX☆162Updated last year
- Database of private SSL/SSH keys for embedded devices☆258Updated last year
- render sprites into your desktop environment as shaped windows using GTK☆20Updated 3 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆49Updated 7 years ago
- Enable Microsoft PDB support in Ghidra without installing Visual Studio☆37Updated 6 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆64Updated 7 years ago
- AM radio data exfiltration with CPU cache in assembly☆19Updated last year
- Binary Golf Library☆62Updated 3 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆65Updated 3 years ago
- yxd - Yuu's heX Dumper☆88Updated 10 months ago
- A simple embedded Linux backdoor.☆198Updated 4 years ago
- Mirror of http://silicone.homelinux.org/git/netsed.git/☆63Updated 7 years ago
- Configure SPI flash write protection.☆23Updated 4 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆45Updated 4 years ago
- File transfer via DNS☆72Updated 7 years ago
- DarkNight theme for Ghidra☆126Updated 4 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆193Updated 7 months ago
- ELF binary that runs on several different *nix flavours. Works out which variant it's being run on and runs code specific to that.☆39Updated 4 years ago
- Bypass the Linux Netfilter using conntrack helpers☆24Updated 9 years ago
- Stealthy data exfiltration via IPv6 covert channel☆104Updated 5 years ago
- The BUSSide Badge☆46Updated 3 years ago