for the null byte, I don't know since I have not tested it anyway they are 2 programs completely different.
for the brute forcing, at the moment only the joining stuff is implemented since for the rest is needed to understand how works the subsequent encryption (probably it uses another key only)
|