HMY626 / MD4-CollisionLinks
MD4 Collisions MD4 is a 128-bit cryptographic hash function, meaning it should take a work factor of roughly 2^64 to find collisions. It turns out we can do much better. The paper "Cryptanalysis of the Hash Functions MD4 and RIPEMD" by Wang et al details a cryptanalytic attack that lets us find collisions in 2^8 or less. Given a message block…
☆17Updated 8 years ago
Alternatives and similar repositories for MD4-Collision
Users that are interested in MD4-Collision are comparing it to the libraries listed below
Sorting:
- Minimal setup to trigger the xz backdoor☆29Updated last year
- Access rizin via pipe from any programming language!☆45Updated last year
- White-box Design and Analysis kit☆24Updated 2 years ago
- LKRG bypass methods☆73Updated 6 years ago
- Database of polyglot files. By polyglot, we mean files readable in multiple formats☆163Updated 8 months ago
- A tool to perform so called BGE attack☆26Updated 7 months ago
- ☆27Updated 2 years ago
- Stuff discovered while analyzing the malware hidden in xz-utils 5.6.0 and 5.6.1☆59Updated last year
- Ledger Donjon CTF 2020☆17Updated 4 years ago
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Updated 8 months ago
- JFFS2 filesystem extraction tool☆85Updated 3 weeks ago
- Research tools developed for Intel Wi-Fi chips☆57Updated 7 months ago
- A step towards automating the creation of Ghidra processor modules☆41Updated 9 months ago
- Ariadne: Binary Ninja Graph Analysis Plugin☆104Updated 11 months ago
- A collection of well labeled ELF binaries compiled from benign and malicious code in various ways. Great for exploring similarity in exec…☆103Updated last year
- Cryptanalysis on differents algorithms with z3 solver sat☆17Updated last year
- ☆48Updated 4 months ago
- CLI tool, Ghidra plug-in, and Haskell library for analyzing binaries using under-constrained symbolic execution☆125Updated last week
- Corewars but within r2☆60Updated last year
- Angr integration with Cutter's debugger☆37Updated 6 years ago
- rev.ng configuration for orchestra. The starting point for any development.☆36Updated last month
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Updated 8 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Updated 4 years ago
- Supporting code and apps for demonstrating Android interprocess communication☆42Updated last year
- Finds the base address of a firmware by comparing string addresses with target pointer addresses☆54Updated 11 months ago
- A command line tool for extracting machine learning ready data from software binaries powered by Radare2☆73Updated 9 months ago
- The public release of LeftoverLocals code☆72Updated 2 weeks ago
- Cross-architecture instruction counting for CTF solving☆48Updated 3 years ago
- Fork Free Fail Repeat☆48Updated 4 years ago
- Binary Type Inference Ghidra Plugin☆168Updated 2 years ago