MD4 Collisions MD4 is a 128-bit cryptographic hash function, meaning it should take a work factor of roughly 2^64 to find collisions. It turns out we can do much better. The paper "Cryptanalysis of the Hash Functions MD4 and RIPEMD" by Wang et al details a cryptanalytic attack that lets us find collisions in 2^8 or less. Given a message block…
☆17Dec 19, 2017Updated 8 years ago
Alternatives and similar repositories for MD4-Collision
Users that are interested in MD4-Collision are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A permissively licensed, low-level, high-performance cryptographic hash library for hackers.☆27Jun 6, 2025Updated 9 months ago
- Cryptanalysis on differents algorithms with z3 solver sat☆18Aug 5, 2024Updated last year
- Parser library for SQLite storage format in Rust☆19Mar 3, 2023Updated 3 years ago
- A tracing tool to analyze the I/O behavior of a program.☆12Sep 25, 2019Updated 6 years ago
- Simple and non-recursive JSON parse/stringify library☆53Jun 19, 2019Updated 6 years ago
- Rust implementation of the Hyperion Ambient Lighting software☆12Mar 17, 2026Updated last week
- An imgui implementation for nvn (the graphics library used by Nintendo Switch) that can be used with Nintendo Switch applications/games.☆11Mar 15, 2023Updated 3 years ago
- PHP Vulnerability Hunter (fork)☆13May 8, 2015Updated 10 years ago
- Extracts MTK_BLOADER_INFO (aka eMMC, eMCP, NAND, DRAM info) from MediaTek Preloaders☆19May 1, 2023Updated 2 years ago
- nVidia Shield TV fastboot bootloader☆14Dec 5, 2018Updated 7 years ago
- Hack to fix PT_DENY_ATTACH on Mac OSX, updated for Snow Leopard.☆22May 9, 2012Updated 13 years ago
- user-space elf loader☆16Nov 18, 2022Updated 3 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Primitives and routines for 2D shapes, curves, and paths. A port of kurbo.☆11Mar 26, 2025Updated 11 months ago
- A (Miasm2 + binaryninja) based function divination.☆15Oct 22, 2017Updated 8 years ago
- A not-at-all-ordered compilation of random security-related powershell scripts :-)☆12Feb 24, 2022Updated 4 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆10Dec 6, 2017Updated 8 years ago
- ☆12Feb 16, 2012Updated 14 years ago
- windows Local privilege escalation for xp sp3+ (x86/x64)☆12Oct 26, 2017Updated 8 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15May 15, 2024Updated last year
- Rootkit breaker - experimental Linux anti-rootkit tool based on kprobes☆12Sep 30, 2020Updated 5 years ago
- ☆12Aug 10, 2019Updated 6 years ago
- A collection of tools for firebase realtime db vulnerability discovery☆12May 22, 2023Updated 2 years ago
- A small crate for hashing multi sets☆18Jul 23, 2021Updated 4 years ago
- Priss is a CSS print framework that ensures that your web pages are nice and readable when printed.☆32Mar 31, 2010Updated 15 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- A fast Python zygote process☆18Oct 17, 2021Updated 4 years ago
- legacy MTK devices preLoader from Mediatek☆20Apr 29, 2024Updated last year
- syscall hijacking in 2019☆13Feb 25, 2019Updated 7 years ago
- Python bindings for Monocypher crypto library.☆18Feb 12, 2026Updated last month
- ☆11Dec 31, 2023Updated 2 years ago
- My experiments in understanding AES, Whitebox AES, and related attacks☆19Oct 11, 2020Updated 5 years ago
- Detecting attack tool for HTTP server such as Apache and Nginx.☆10Dec 22, 2013Updated 12 years ago
- Pure Scheme Gopher Server☆11Jan 21, 2012Updated 14 years ago
- Implementation of Silvio Cesare text infection technic☆10Jan 5, 2018Updated 8 years ago
- Collection of ezine about virii☆17Sep 13, 2022Updated 3 years ago
- Run Unikraft ELF Loader app on Linux executables☆15Oct 19, 2023Updated 2 years ago
- ☆13May 5, 2018Updated 7 years ago