108 results for “topic:xor-encryption”
XOR encryption implementations for several languages.
A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.
A PE (Portable Executable) packer with Huffman Compression and Xor encryption.
A hands-on book for abusing systems using Rust (WIP) - Open Research
🔣 ISAAC is a fast, seedable, cryptographically secure pseudo-random number generator (CSPRNG) and synchronous stream cipher.
Simple shellcode injection in Nim encrypted in XOR
Library for simple connection via OpenVPN protocol with Xor patch.
A Scantime Crytper that applies an obfuscation method onto a malware/false-positive so an antivirus cannot successfully match it with any malicious signature, evading antivirus signature-based detection.
RustyXOR is a command-line tool for encrypting and decrypting files using the XOR cipher in ECB mode. It features a user-friendly interface, progress visualization, and ensures secure handling of your data. Built with Rust, RustyXOR provides efficient and transparent operations.
Console App That Uses Cryptography And Steganography To Embed/Extract Secret Message In/From an Image
Runtime xor protection for values, pointers and functions
A powerful and memory-safe steganography tool 🕵️♂️ (WIP)
PE Crypter x86-64 for Windows
Assembly 8086 projects
XOR Obfuscator for strings
Programa de cifrado y descifrado de textos en C
Image cryptography techniques
A simple malware program that enrypts files with an XOR cipher. DANGEROUD DO NOT USE (C# version of Fafnir-CPP)
File Encryptor using XOR
Simple file encrypter and decrypter using XOR encryption with key saver function
A simple malware program that enrypts all files important for Windows with an XOR cipher. DANGEROUS DO NOT USE
一个帮助程序员们练习前端逆向和WASM逆向的逆向工程学习平台,包含多种加密算法实现和对应的 Web 前端界面,部分前端界面提供了逆向题
Cryptographic application in C#
No description provided.
No description provided.
A simple tool to xor any number of files together.
XORPHER - Advanced XOR encryption tool for antivirus/EDR evasion. Features 5 algorithms (Simple, Rotating, Polymorphic, Custom, Legacy), configurable key lengths (1-64 bytes), garbage insertion, and auto-verification. Educational tool for security research.
Use CUDA(CGU) to accelerate XOR-based unpacking of a binary
A simple XOR file encoder.
raw shellcode to xor with c++ sutable byte array