GeorgeArgyros / mt_derand
Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operations. The mt_derand project provides code to invert the Mersenne Twister generator and obtain its internal state which in turn can be used to predict all future outputs of the generator.
☆28Updated 9 years ago
Alternatives and similar repositories for mt_derand:
Users that are interested in mt_derand are comparing it to the libraries listed below
- Timing Attack on TLS' ECDSA signature☆42Updated 9 years ago
- This is a toy implementation in Go of Manger's chosen-ciphertext attack on RSA-OAEP☆31Updated 6 years ago
- Code to fuzz bignum libraries☆45Updated 6 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Updated 7 years ago
- Detect patterns of bad behavior in function calls☆25Updated 4 years ago
- Kudelski Security's 2018 pre-Black Hat crypto challenge☆36Updated 6 years ago
- Secretgrind: a Valgrind analysis tool to detect secrets in memory☆59Updated 8 years ago
- ☆170Updated 3 years ago
- free crypto audit☆31Updated 7 years ago
- This repo holds materials for our Splash 2017 class on Z3.☆25Updated 7 years ago
- ☆19Updated 5 years ago
- Simple application for playing with elliptic curves☆44Updated 2 years ago
- Detecting Spectre vulnerabilities using symbolic execution, built on angr (github.com/angr/angr)☆75Updated 2 years ago
- single file ctf/exploit client library - python3, type annotated☆67Updated last year
- GATEKEEPER: Inline and on-target defense☆119Updated 2 years ago
- Fuzzing results for various interpreters.☆80Updated 6 years ago
- Research on WebAssembly☆40Updated 2 years ago
- Short, unrelated helper scripts for users of AFL (the fuzzer)☆110Updated 8 years ago
- A program to draw rectangles from heap traces.☆132Updated 4 years ago
- RuCTFE 2015☆21Updated 9 years ago
- ARM rop chain gadget searcher☆37Updated 7 years ago
- RuCTF 2016 repository☆16Updated 5 years ago
- ☆75Updated 7 months ago
- ☆89Updated 6 months ago
- Some RSA attacks with sage☆10Updated 8 years ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- A Python3 software that validates a client's side SSL/TLS application's X509 verification process☆142Updated 10 years ago
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆40Updated 7 years ago
- Analysis and generation of substitutions☆23Updated 2 years ago
- PoC for CVE-2015-6086☆68Updated 8 years ago