Implementation of attacks on cryptosystems
☆76Jul 29, 2025Updated 7 months ago
Alternatives and similar repositories for CryptoAttacks
Users that are interested in CryptoAttacks are comparing it to the libraries listed below
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆143Mar 13, 2024Updated last year
- Fixes known BinaryFormatter deserialization vulnerabilities☆12Dec 16, 2019Updated 6 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- Those are my challenges for multiple CTF!☆10Mar 17, 2024Updated last year
- Crypto projects in python, e.g. Attacks to Vigenere, RSA, Telnet Protocol, Hip Replacement , Vernam cipher, Crack Zip Files, Encryptions…☆20Mar 6, 2023Updated 2 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- An easy-to-use, general and open-source tool to solve the guess-and-determine problem☆30Feb 25, 2026Updated last week
- ☆13Jan 22, 2025Updated last year
- Challenges for ImaginaryCTF 2023☆14Jul 29, 2023Updated 2 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- ☆12Aug 22, 2022Updated 3 years ago
- simple demo of using C# & System.Management.Automation.dll to run powershell code (b64 encoded) without powershell.exe☆14Mar 29, 2017Updated 8 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆251Jul 6, 2023Updated 2 years ago
- Useful crypto tools for CTF☆40Jul 2, 2022Updated 3 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆28Oct 7, 2021Updated 4 years ago
- Some crypto scripts which is useful in study and ctf☆29Sep 2, 2021Updated 4 years ago
- 👀Dynamic memory watcher/tracer/analyzer for CTF pwn☆51Jul 11, 2020Updated 5 years ago
- CTF problems I have created.☆14Mar 5, 2023Updated 3 years ago
- A Modern Approach☆10Sep 5, 2015Updated 10 years ago
- ☆11Nov 19, 2017Updated 8 years ago
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- multiarch qemu system env for playing and debugging :)☆32Nov 3, 2021Updated 4 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆100Apr 20, 2021Updated 4 years ago
- ☆66Nov 10, 2025Updated 3 months ago
- ☆13Aug 13, 2019Updated 6 years ago
- A minimalist macOS app to convert a snap of Equation to LaTeX without paying☆15Jun 14, 2024Updated last year
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- PoC showing how a potentially malicious script could be hidden, encrypted, into invisible unicode characters☆15May 26, 2019Updated 6 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- An implementation of RSA extending Wiener attack☆16Dec 28, 2021Updated 4 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆140Apr 17, 2023Updated 2 years ago
- 7 days of Red Teaming TTPs that your favorite tools may use to acheive a post exploitation goal☆18Apr 17, 2021Updated 4 years ago
- ☆16Jun 23, 2024Updated last year
- A Windows REG file to enable all default PowerShell logging on a system with PowerShell v5 installed☆16Jun 20, 2016Updated 9 years ago