Skip to content

Latest commit

 

History

History
17 lines (10 loc) · 684 Bytes

README.md

File metadata and controls

17 lines (10 loc) · 684 Bytes

unXOR

This tool will search through an XOR-encoded file (binary, text-file, whatever) and use known-plaintext attacks to deduce the original keystream. Works on keys half as long as the known-plaintext, in linear complexity.

The code is pretty straightforward

For more details and a short explanation of the theory behind this, please refer to:

Related work:

Written by Thomas Chopitea (@tomchop_)