Some crypto scripts which is useful in study and ctf
☆29Sep 2, 2021Updated 4 years ago
Alternatives and similar repositories for cryptography
Users that are interested in cryptography are comparing it to the libraries listed below
Sorting:
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- ☆10Nov 23, 2021Updated 4 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Apr 17, 2023Updated 2 years ago
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- CVP "trick" for CTF challenges☆149Jun 19, 2023Updated 2 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Infer internal state of Mersenne Twister from truncated output☆77Jul 28, 2022Updated 3 years ago
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆40Dec 20, 2022Updated 3 years ago
- A simplified pwntools for SageMath.☆11Dec 23, 2025Updated 2 months ago
- Cryptographic algorithm implementation☆50Jan 22, 2023Updated 3 years ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- ☆27May 25, 2022Updated 3 years ago
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- 可快速部署的在线剪贴板工具☆14Aug 26, 2024Updated last year
- Fast lattice reduction☆233Aug 25, 2025Updated 6 months ago
- MSIEVE: A Library for Factoring Large Integers☆14Apr 7, 2023Updated 2 years ago
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆40Aug 1, 2020Updated 5 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- ☆46Feb 28, 2023Updated 3 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 3 months ago
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- Homemade implementation of Square Attack against 4 rounds AES☆15Feb 2, 2020Updated 6 years ago
- Short writeups/solvers for interesting CTF challenges.☆16Nov 12, 2022Updated 3 years ago
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Jan 8, 2017Updated 9 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Jul 16, 2021Updated 4 years ago
- CTF writeups☆19Oct 19, 2023Updated 2 years ago
- ☆15Mar 14, 2023Updated 3 years ago
- shw's CTF challenges☆27Apr 5, 2021Updated 4 years ago
- Python library for vectorial Boolean functions in cryptography☆11Nov 15, 2023Updated 2 years ago
- attacking RSA via lattice reductions (LLL)☆832Apr 11, 2021Updated 4 years ago
- CTF write-ups☆218Feb 12, 2025Updated last year
- ☆12Aug 25, 2018Updated 7 years ago
- CTF problems I have created.☆14Mar 5, 2023Updated 3 years ago
- Parses Lua 5.1 bytecode☆13May 27, 2025Updated 9 months ago
- Toolkit for creating cryptographic figures and videos.☆35May 17, 2024Updated last year
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago