mstrand / xcat
XOR cat - a command line tool to XOR a data stream with a given key
☆35Updated 12 years ago
Alternatives and similar repositories for xcat
Users that are interested in xcat are comparing it to the libraries listed below
Sorting:
- Generate very tiny reverse shell binaries for Linux~☆75Updated 4 years ago
- Nyancat in the MBR☆121Updated 12 years ago
- ☆45Updated last month
- Reverse engineering challenges☆50Updated 5 years ago
- Intro to Assembly Optimization stream repo☆25Updated 3 years ago
- The BUSSide Badge☆46Updated 3 years ago
- Binary Protocol Differ☆118Updated 4 years ago
- render sprites into your desktop environment as shaped windows using GTK☆20Updated 3 years ago
- Reverse Engineering tools, scripts, and general commentary☆58Updated 6 years ago
- Python tool for dumping flash via uboot reliably☆27Updated 3 years ago
- Binary Golf Library☆62Updated 4 years ago
- European Cyber Security Challenge Gameboard☆29Updated 3 years ago
- nü-map: a somewhat-more-modern (expeirmental) derivative of umap2 for modern FaceDancer☆26Updated last year
- yxd - Yuu's heX Dumper☆88Updated 10 months ago
- Ghidra Loader for ESP32 Flash Dumps☆21Updated 3 months ago
- USB armory Debian base image☆79Updated last month
- ☆12Updated 2 months ago
- Content related to hardware hacking☆52Updated 6 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆49Updated 7 years ago
- encrypted-linux-kernel-modules☆12Updated 4 years ago
- Ghidra scripts for recovering string definitions in Go binaries☆111Updated 6 months ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆49Updated 8 years ago
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆58Updated 5 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆24Updated 2 years ago
- DarkNight theme for Ghidra☆126Updated 4 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆65Updated 8 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year
- Tool for visualizing and empirically analyzing information encoded in binary files☆78Updated 4 years ago
- ☆8Updated 3 years ago
- ☆12Updated 2 years ago