AydanPirani / test
☆7Updated 11 months ago
Alternatives and similar repositories for test:
Users that are interested in test are comparing it to the libraries listed below
- The website for ACM@UIUC☆11Updated this week
- Challenge source code and deployment scripts for UIUCTF 2021☆15Updated 3 years ago
- Discord bot to fetch UIUC classes.☆19Updated last year
- A tool to easily archive CTFd sites to GitHub Pages☆32Updated 3 months ago
- SIGPwny's websites and club content monorepo☆12Updated this week
- Course selection made easy☆19Updated last year
- Docker image for attacking cryptography CTF challenges☆97Updated 9 months ago
- CVP "trick" for CTF challenges☆130Updated last year
- Coppersmith's method for multivariate polynomials☆158Updated last year
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆41Updated last year
- Representing DES in Z3☆15Updated last year
- ☆43Updated 3 weeks ago
- A survey of known lower bounds in arithmetic circuits.☆29Updated 2 years ago
- ☆28Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆28Updated 5 months ago
- Hosting awesome cryptography CTF challenges from past CTFs☆106Updated last month
- GreyCTF 2022 challenge source and solution☆17Updated 2 years ago
- A community driven resource for learning CryptoGraphy☆57Updated last year
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆82Updated 7 months ago
- SMT based attacks on non cryptographic PRNGs☆77Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆126Updated last year
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆99Updated last month
- ☆21Updated last month
- A toolkit for cryptanalysis using lattices.☆112Updated last year
- Some writeups for some CTFs☆16Updated 10 months ago
- Docker container that creates an easy authentication system with UIUC's Shibboleth Identity Provider☆8Updated 2 weeks ago
- My CTF challenges, especially cryptography☆25Updated 2 months ago
- Functions for solving linear inequalities in integers☆45Updated 3 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆127Updated 11 months ago
- Defeating Pointer Authentication on the Apple M1 with Hardware Attacks☆37Updated 2 years ago