A tool to do some xor analysis: guess the key length (based on count of equal chars) guess the key (base on knowledge of most frequent char). xortool is now only running on Python 3. The old Python 2 version is accessible at the py2 branch. The pip package has been updated. Installation: $ pip3 install xortool. For development or building this repository, poetry is needed. poetry build pip install dist/xortool*.whl. Usage: xortool A tool to do some xor analysis: - guess the key length (based on count of equal chars) - guess the key (base on knowledge of most frequent char).
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A versatile steganography tool with various installation options and detailed usage instructions.
de4dot is a .NET deobfuscator and unpacker with the ability to restore packed and obfuscated assemblies to their original form.
A command line tool for transparently hiding files within images using LSB steganography.
A steganographic file system in userspace for plausible deniability of files.
BleachBit cleans files to free disk space and maintain privacy with various options and command line interface support.
A project focusing on deconstructing and utilizing data for security using Python modules like IPython, Pandas, and Scikit Learn.
A demonstration of a method to delete a locked executable or currently running file from disk.
A cloud-native, event-driven data pipeline toolkit for security teams with extensible data processing and serverless deployment.
Steganography brute-force utility with performance issues, deprecated in favor of stegseek.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.