HugoBond / CVE-2024-31497-POCLinks
Proof Of Concept that exploits PuTTy CVE-2024-31497.
☆11Updated last year
Alternatives and similar repositories for CVE-2024-31497-POC
Users that are interested in CVE-2024-31497-POC are comparing it to the libraries listed below
Sorting:
- A Sage implementation of the ROCA attack☆27Updated 2 years ago
- Breaking ECDSA (not so broken) with LLL☆88Updated last month
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆47Updated 3 years ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆30Updated 5 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆140Updated last year
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆40Updated 3 weeks ago
- Docker image for attacking cryptography CTF challenges☆112Updated last year
- SMT based attacks on non cryptographic PRNGs☆86Updated 2 years ago
- ☆112Updated 2 years ago
- ☆109Updated 11 months ago
- A full English version of the popular ctf-wiki☆104Updated last year
- An automatic Blind ROP exploitation tool☆208Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆97Updated 4 years ago
- ☆64Updated last month
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14Updated last year
- Files + Solutions for DownUnderCTF 2024 Challenges☆118Updated last year
- A toolkit for cryptanalysis using lattices.☆133Updated 2 years ago
- Cryptography & CTF Writeups☆83Updated 2 years ago
- Some writeups for some CTFs☆18Updated last year
- Hosting awesome cryptography CTF challenges from past CTFs☆125Updated 5 months ago
- ASLR bypass without infoleak☆163Updated 4 years ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Updated 4 years ago
- ☆105Updated last year
- A community driven resource for learning CryptoGraphy☆70Updated 2 years ago
- ☆50Updated 3 years ago
- ☆40Updated 3 years ago
- ☆45Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Updated last year
- Tool for generating Elliptic curve domain parameters☆130Updated last week