HugoBond / CVE-2024-31497-POCLinks
Proof Of Concept that exploits PuTTy CVE-2024-31497.
☆10Updated last year
Alternatives and similar repositories for CVE-2024-31497-POC
Users that are interested in CVE-2024-31497-POC are comparing it to the libraries listed below
Sorting:
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Updated 2 years ago
- A Sage implementation of the ROCA attack☆23Updated 2 years ago
- CADO-NFS is a complete implementation in C/C++ of the Number Field Sieve (NFS) algorithm for factoring integers. For official releases, p…☆26Updated 5 years ago
- Breaking ECDSA (not so broken) with LLL☆85Updated last month
- SMT based attacks on non cryptographic PRNGs☆86Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆93Updated 4 years ago
- ☆111Updated 2 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆137Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆32Updated last year
- ☆55Updated last month
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- ☆104Updated 8 months ago
- A toolkit for cryptanalysis using lattices.☆129Updated last year
- 🔐Introduction to lattice-based attacks in cryptanalysis☆14Updated last year
- ☆105Updated last year
- Cryptography & CTF Writeups☆83Updated 2 years ago
- Some writeups for some CTFs☆17Updated last year
- ☆40Updated 3 years ago
- ☆45Updated 2 years ago
- This is a comprehensive collection of challenges from past CTF competitions. The challenges are stored with REHOST details and can be run…☆57Updated last week
- ASLR bypass without infoleak☆160Updated 3 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆122Updated 3 months ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Updated 4 years ago
- Complex multiplication based factorization☆38Updated 3 years ago
- Docker image for attacking cryptography CTF challenges☆106Updated last year
- A tool for automating setup of kernel pwn challenges☆60Updated 3 months ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆41Updated 2 years ago
- Source code and solution of CTF challenges that I created.☆47Updated 3 months ago
- All Files, Scripts, and exploits can be found here☆67Updated 4 years ago