XOR Known-Plaintext Attack && Many Time Pad Attack
Known-Plaintext Attack
takes an (ecrypted File , base64 string , hex string ) and a part of Plaintext and reverse xors it with a password specified by the user. This well then produce the plaintext dataFlag{W3lc0me_T0_X0R}
you should put a part from Plaintext Like Flag{
Many Time Pad Attack
Takes (ecrypted Files or base64 strings or hex strings and Target Cipher) and get The Comman Key Between Them Then Get The PlainText of Target Cipher1 - Download Tool :
git clone https://github.com/X-Vector/X0R.git
2 - Install requirement
sudo pip install requirement.txt
3 - Open Tool :
python X0R.py