Skip to content
/ X0R Public

XOR Known-Plaintext Attack && Many Time Pad Attack

Notifications You must be signed in to change notification settings

X-Vector/X0R

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

16 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

XOR Attacks

  • This tool contains the most common two types of attack [Known-Plaintext Attack , Many Time Pad Attack]
  • The First Attack Known-Plaintext Attack takes an (ecrypted File , base64 string , hex string ) and a part of Plaintext and reverse xors it with a password specified by the user. This well then produce the plaintext data
  • if we say your Plaintext is Flag{W3lc0me_T0_X0R} you should put a part from Plaintext Like Flag{
  • The Secound Attack Many Time Pad Attack Takes (ecrypted Files or base64 strings or hex strings and Target Cipher) and get The Comman Key Between Them Then Get The PlainText of Target Cipher

Downloading and Open Tool :

1 - Download Tool :

git clone https://github.com/X-Vector/X0R.git

2 - Install requirement

sudo pip install requirement.txt

3 - Open Tool :

python X0R.py

Screenshot :

X0R X0R

About

XOR Known-Plaintext Attack && Many Time Pad Attack

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages