mstrand / xcatLinks
XOR cat - a command line tool to XOR a data stream with a given key
☆33Updated 12 years ago
Alternatives and similar repositories for xcat
Users that are interested in xcat are comparing it to the libraries listed below
Sorting:
- Nyancat in the MBR☆124Updated 13 years ago
- Simple tool to graph files for quick analysis☆57Updated last year
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆53Updated 8 years ago
- Binary Protocol Differ☆118Updated 5 years ago
- A low pin count sniffer for ICEStick - targeting TPM chips☆169Updated 5 years ago
- Reversing CRC for fun and profit☆212Updated last year
- RF430FRL152H examples for NFC Type V in Kicad and C.☆77Updated 6 years ago
- TPM-Fail Attack code & data☆124Updated 2 years ago
- This tool emulates an EMV-CAP device, to illustrate the article "Banque en ligne : à la decouverte d'EMV-CAP" published in MISC, issue #5…☆34Updated 3 months ago
- Intro to Assembly Optimization stream repo☆29Updated 4 years ago
- lovense hush buttplug exploit chain☆220Updated 6 years ago
- yxd - Yuu's heX Dumper☆92Updated last year
- Tools to generate a Linux distribution booting from a USB key to test hardware requirements☆50Updated 9 months ago
- The BUSSide Badge☆48Updated 3 years ago
- Placeholder repo 👀☆47Updated 4 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆68Updated 8 years ago
- Thunderbolt Controller Firmware Patcher.☆68Updated 3 years ago
- Modern exploit in Golang for ancient Nagra / Dish Network cards.☆33Updated 11 months ago
- Defcon 27 "SDR Against Smart TVs: URL and Channel Injection Attacks" presentation repo☆57Updated 6 years ago
- Colorize data file according to repetitive chunks, typical in ECB encrypted☆47Updated 5 years ago
- libsigrok stacked Protocol Decoder for TPM 2.0 & TPM 1.2 transactions from an SPI bus. BitLocker Volume Master Key (VMK) are automaticall…☆25Updated 3 years ago
- Notes and tools from my experiences reverse engineering firmware☆143Updated 6 years ago
- USB armory Debian base image☆84Updated 2 months ago
- ☆37Updated 4 years ago
- Albums for the Illustrated RFID gallery☆37Updated 7 months ago
- Tool for visualizing and empirically analyzing information encoded in binary files☆79Updated 5 years ago
- Random tools, code snippets, etc. No guarantee that any of this stuff works.☆52Updated last year
- Scout - Instruction based research debugger (a poor man's debugger)☆155Updated 2 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆218Updated 3 years ago