mstrand / xcatLinks
XOR cat - a command line tool to XOR a data stream with a given key
☆33Updated 12 years ago
Alternatives and similar repositories for xcat
Users that are interested in xcat are comparing it to the libraries listed below
Sorting:
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- Database of private SSL/SSH keys for embedded devices☆265Updated last year
- A low pin count sniffer for ICEStick - targeting TPM chips☆169Updated 5 years ago
- Nyancat in the MBR☆122Updated 12 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆66Updated 8 years ago
- Intro to Assembly Optimization stream repo☆26Updated 3 years ago
- lovense hush buttplug exploit chain☆218Updated 6 years ago
- Notes and tools from my experiences reverse engineering firmware☆140Updated 6 years ago
- TPM-Fail Attack code & data☆122Updated 2 years ago
- Binary Protocol Differ☆118Updated 5 years ago
- For when you want a computer to be done - without admin!☆308Updated 7 years ago
- Configure SPI flash write protection.☆24Updated 5 years ago
- Intel Management Engine JTAG Proof of Concept☆144Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated 2 years ago
- Scout - Instruction based research debugger (a poor man's debugger)☆156Updated 2 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆52Updated 7 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆24Updated 3 years ago
- a low pin count sniffer for icestick☆96Updated 6 years ago
- DarkNight theme for Ghidra☆127Updated 5 years ago
- Binary Golf Library☆62Updated 4 years ago
- The BUSSide Badge☆48Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Simple tool to graph files for quick analysis☆55Updated last year
- yxd - Yuu's heX Dumper☆89Updated last year
- Keystroke injection vulnerabilities in wireless presentation clickers☆96Updated 5 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆46Updated 4 years ago
- Binary Golf Grand Prix☆113Updated last year
- Reverse engineering challenges☆52Updated 5 years ago
- Reverse Engineering tools, scripts, and general commentary☆59Updated 6 years ago
- Placeholder repo 👀☆47Updated 4 years ago