mstrand / xcatLinks
XOR cat - a command line tool to XOR a data stream with a given key
☆33Updated 12 years ago
Alternatives and similar repositories for xcat
Users that are interested in xcat are comparing it to the libraries listed below
Sorting:
- Database of private SSL/SSH keys for embedded devices☆269Updated last year
- A low pin count sniffer for ICEStick - targeting TPM chips☆170Updated 5 years ago
- Nyancat in the MBR☆124Updated 12 years ago
- Archive of the original "cold boot" attack tools from CITP at Princeton. The original links are broken.☆54Updated 8 years ago
- Reversing CRC for fun and profit☆210Updated last year
- Simple tool to graph files for quick analysis☆57Updated last year
- yxd - Yuu's heX Dumper☆91Updated last year
- lovense hush buttplug exploit chain☆220Updated 6 years ago
- Fork of aeskeyfind that knows more formats of AES key schedule☆67Updated 8 years ago
- crypted admin shell: SSH-like strong crypto remote admin shell for Linux, BSD, Android, Solaris and OSX☆210Updated 8 months ago
- Intro to Assembly Optimization stream repo☆26Updated 4 years ago
- Volatility plugin to extract BitLocker Full Volume Encryption Keys (FVEK)☆70Updated 4 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Created by Jeffrey Martin via the GitHub Connector☆26Updated 10 months ago
- Binary Protocol Differ☆118Updated 5 years ago
- USB armory Debian base image☆84Updated 2 months ago
- Linux netfilter module to toggle evil bit (RFC 3514) in all outgoing IPv4 packets☆28Updated 8 years ago
- Random tools, code snippets, etc. No guarantee that any of this stuff works.☆52Updated last year
- Create polyglot files, which are valid PDF and ZIP simultaneously. See POC||GTFO 07. (forked from git.hackade.org)☆73Updated 2 months ago
- Password scrambler - a deterministic password re-generator (alternative to a password manager)☆131Updated 3 years ago
- Written by InGuardians' Faith Alderson and Larry Pesce, VaporTrail is a tool for data transmission over FM, using RPITX to transmit from …☆53Updated 8 years ago
- Reverse engineering challenges☆52Updated 6 years ago
- A stealthy ELF loader - no files, no execve, no RWX☆172Updated 2 years ago
- Enable Microsoft PDB support in Ghidra without installing Visual Studio☆37Updated 6 years ago
- Tools for decoding TPM SPI transaction and extracting the BitLocker key from them.☆315Updated 3 years ago
- Placeholder repo 👀☆47Updated 4 years ago
- This tool can decrypt a BitLocker-locked partition with the TPM vulnerability☆218Updated 3 years ago
- U3 armory - exploiting the AutoRunz☆22Updated 8 years ago
- Repository containing many useful scripts☆75Updated 3 years ago
- SSL certificate cloner☆14Updated 7 years ago