This new version of xor-kpa adds the option -x to encode/decode, and also prints the hexadecimal value of the found keys.
xor-kpa_V0_0_4.zip (https)
MD5: FCE75B6125104D8AFC56A67B65FF75C0
SHA256: 3DCCA479D4C8CAC9B248B24F799184A69D0F10403593CB002248DD35CCE60FD4
[…] Xor-kpa was updated to version 0.0.4 adding “the option -x to encode/decode, and also prints the hexadecimal value of the found keys”. Update: xor-kpa.py Version 0.0.4 […]
Pingback by Week 48 – 2016 – This Week In 4n6 — Sunday 4 December 2016 @ 7:56
[…] Update: xor-kpa.py Version 0.0.4 […]
Pingback by Overview of Content Published In November | Didier Stevens — Tuesday 6 December 2016 @ 0:00
[…] now, the embedded executables were base64 encoded and started with TVqQAA… Let’s use xor-kpa to try to recover the […]
Pingback by New Hancitor maldocs keep on coming… | NVISO LABS – blog — Thursday 30 March 2017 @ 8:43