xor-cipher
There are 116 repositories under xor-cipher topic.
hellman/xortool
A tool to analyze multi-byte xor cipher
SmartXiaoMing001/RC4Test
这是一个可以加解密文件的demo,包括视屏,音频,文本,图片等所有文件的加解密,与DES相比,流密码操作简单,按位异或,并可以根据口令,生成复杂的秘钥进行加密 ~~~
pannous/xipher
🔒 Simple perfect xor encryption cipher 🔒
macmcmeans/isaacCSPRNG
🔣 ISAAC is a fast, seedable, cryptographically secure pseudo-random number generator (CSPRNG) and synchronous stream cipher.
Fytex/simple-ransomware
Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!
amaitou/Xorcry
Simple encryption tool designed to perform a bitwise XOR operation (XORing) on the contents of files with specific extensions in a given directory or file path. The XOR operation is executed using a user-defined key to encrypt the data.
cheatsnake/classify
:key: Simple API for enrypting/decrypting text messages
CrypTools/XORCipher
Additive Cipher related to binary
FuturraGroup/OpenVPNXor
Library for simple connection via OpenVPN protocol with Xor patch.
a-p-jo/XOTP
XOR One Time Pad Cipher written in C
Sina-Ghaderi/rabbitio
rabbit stream cipher package RFC 4503 for Go
craftxbox/yubiclip-xor
Fork of Yubiclip for Static Passwords over NFC. Encrypt your static password to secure it from Drive-by reading attacks.
malladisiddu/ZCrypt
Basic decryption tool
subsoap/pack
Compress, decompress, and obfuscate table data with Defold
MuonRay/Quantum-Encryption-of-Images-using-Bitwise-XOR-and-QRNG
Article here: http://muonray.blogspot.com/2022/02/quantum-encryption-of-images-in-python.html The definition of image encryption used here is an extension of data encryption in general: using the bitwise XOR operation of the original image pixels and the random key image pixels, with the key image being either a pseudo-random stream cipher or the quantum random stream cipher or anti-correlated entangled information shared over a secure channel. In either case we Perform bitwise XOR operation on the encrypted image and the key image. It can be seen from the image encryption and decryption that they are all the same operation. According to the above bitwise XOR operation, we assume: xor(a,b)=c You can get: xor(c,b)=a Or: xor(c,a)=b In summary, we assume that a is the original image data and b is the key, then c calculated by xor(a,c) is the encrypted ciphertext. This is a simple summary of the encryption and decryption process as used in the coding in this repository. Encryption process: Perform a bitwise XOR operation on the image a and the key b to complete the encryption and obtain the ciphertext c. Decryption process: Perform a bitwise XOR operation on the ciphertext c and the key b, complete the decryption, and get the image a. We can use our quantum random numbers generator in 2 ways to create our image encryption key: (1) as a random number generator seed source (2) using the random superposition of the H and V modes We can also use the shared set of correlated images, captured using the single CCD, from our entangled photon source with Alice getting one half and Bob getting the anti-correlated half. This provides the perfect key, with the quantum images shared over a separate channel hidden from the encrypted classical images. The file exchange channel is 2 way: Alice can use Her key to encrypt the image, Bob can use His key to decrypt the image OR Bob can use His key to encrypt the image, Alice can use Her key to decrypt the image. The XOR Cipher in this use can also be extended as a component in more complex overlay network ciphers if need be however for computational efficiency it is not necessary. It is just as effectual to have 1 quantum cipher as many, so in effect the system is completely hidden, by virtue of hidden variables, and is encrypted in an information condensate.
Bisonai/flutter-machine-learning-security
Protect your Machine Learning model in your Flutter application.
liborty/TokenCrypt
Compress, encrypt, archive. Easy and secure..
PlugFox/xor_cipher
The XOR Encryption algorithm is an effective and easy-to-implement method of symmetric encryption.
VAD3R-95/Misc-Scripts...
Simple {scripts for ctf`s and challenges/python irc bot/automating stuff etc.}
adityashinde521/DataShield
A Python Tool to encrypt all types of files using AES and XOR Algorithm.
nronzel/xoracle
Brute force repeating-key XOR cracker.
Hue-Jhan/Encrypted-Trojan-Undetected
Encrypted self-injection malware that creates a shell on a victim's pc, using Xor and Base64 encryption.
kartikhunt3r/Adrishya-StegKit
A Stegbography Toolkit for CTF Players and Organizers. All in one Stegnography toolkit in Python
Lrakulka/Double_Bottom_USB_Stick
Google Summer of Code 2017 | Student Project
MechaDragonX/Fafnir.NET
A simple malware program that enrypts files with an XOR cipher. DANGEROUD DO NOT USE (C# version of Fafnir-CPP)
mightbesimon/XOR-file-encryption
Encrypts files with a password byte-by-byte using a XOR cipher
AlexeyChernikov/CryptographicApplication
Cryptographic application in C#
BoyBACKS/XOREncrypt
Simple file encrypter and decrypter using XOR encryption with key saver function
gilmansharov/File-Encryptor-Decryptor
Simple tool for encrypting and decrypting binary and text files using xor algorithm
Locotir/LCRYPT
Unbreakable encryption combination [ Byte Shuffle | reverse-bits | bit-padding | byte-to-decimal | decimal-to-byte | XOR Key ]
MechaDragonX/Fafnir-CPP
A simple malware program that enrypts all files important for Windows with an XOR cipher. DANGEROUS DO NOT USE
michaelvanstraten/encryption-macros
Macros for compile time String obfuscations
myStery24/matlab-image-encryption-decryption
BIM33403 Multimedia Security Technology Semester 6 Lab 2
shank03/XORCryptor
CLI tool for multi-threaded XOR encryption
AyeshaIftikhar/xor_cipher
Simply put, XOR (pronounced “exclusive or”) cipher is an additive cypher. It is based on the XOR operation (also known as the exclusive disjunction) in logic. As a logical operation, XOR is also called modulus 2 addition. In XOR operation, the output is true when the inputs differ.
vatsalgupta67/Shellzor
XOR shellcode framework