Some crypto scripts which is useful in study and ctf
☆29Sep 2, 2021Updated 4 years ago
Alternatives and similar repositories for cryptography
Users that are interested in cryptography are comparing it to the libraries listed below
Sorting:
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- CVP "trick" for CTF challenges☆150Jun 19, 2023Updated 2 years ago
- A repository trying to collect things related to LLL☆73Sep 10, 2024Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Apr 17, 2023Updated 2 years ago
- Cryptography & CTF Writeups☆83Feb 20, 2023Updated 3 years ago
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆40Dec 20, 2022Updated 3 years ago
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆40Aug 1, 2020Updated 5 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- ☆10Nov 23, 2021Updated 4 years ago
- MSIEVE: A Library for Factoring Large Integers☆14Apr 7, 2023Updated 2 years ago
- Coppersmith's method for multivariate polynomials☆193Oct 11, 2023Updated 2 years ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- Infer internal state of Mersenne Twister from truncated output☆77Jul 28, 2022Updated 3 years ago
- Fast lattice reduction☆231Aug 25, 2025Updated 6 months ago
- 可快速部署的在线剪贴板工具☆14Aug 26, 2024Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- Export IDA microcode to BinExport format so that you can use BinDiff to diff microcodes☆12Sep 21, 2024Updated last year
- Create single-executable models of distributed systems.☆19Jun 28, 2021Updated 4 years ago
- Homemade implementation of Square Attack against 4 rounds AES☆15Feb 2, 2020Updated 6 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- ☆15Sep 7, 2020Updated 5 years ago
- ☆44Feb 28, 2023Updated 3 years ago
- ☆15Mar 14, 2023Updated 2 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Jul 16, 2021Updated 4 years ago
- CTF writeups☆18Oct 19, 2023Updated 2 years ago
- Microsoft's Debug Interface Access SDK☆27Nov 9, 2024Updated last year
- 🧩 Collection of CTF challenges written by me☆19Mar 30, 2025Updated 11 months ago
- Inti easter challenge poc☆18May 4, 2021Updated 4 years ago
- ☆23Mar 4, 2025Updated 11 months ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆100Apr 20, 2021Updated 4 years ago
- ☆27Feb 13, 2026Updated 2 weeks ago
- ctfs-2020☆17Mar 15, 2020Updated 5 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago