MEGA-Awry / attacks-poc
PoC for our attacks on MEGA.
☆25Updated 2 years ago
Related projects: ⓘ
- Slides from our technical talks☆25Updated last week
- ☆52Updated 4 years ago
- SMT based attacks on non cryptographic PRNGs☆73Updated last year
- A Sage implementation of the ROCA attack☆20Updated last year
- Typora theme based on the CryptoHack blog☆32Updated 3 years ago
- ☆25Updated 3 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆60Updated 3 years ago
- A Tamarin model and analysis of EMV☆28Updated 3 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆12Updated last year
- Toolkit for creating cryptographic figures and videos.☆27Updated 4 months ago
- Complex multiplication based factorization☆35Updated 2 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆108Updated 6 months ago
- Hosting awesome cryptography CTF challenges from past CTFs☆100Updated 2 months ago
- Where CTFs happen☆76Updated 3 months ago
- Implements Coron's simplification of Coppersmith's algorithm☆40Updated 11 months ago
- visualizing CTF clusters (teams playing together at DEFCON)☆27Updated last year
- Personal challenge archive☆17Updated 3 months ago
- My experiments in understanding AES, Whitebox AES, and related attacks☆15Updated 3 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆51Updated 3 months ago
- Cryptovenom: The Cryptography Swiss Army Knife☆10Updated 4 years ago
- Some writeups for some CTFs☆17Updated 5 months ago
- Challenges I've made for public CTFs.☆20Updated 2 months ago
- Proof-of-concept for Spook.js☆69Updated 3 years ago
- Docker image for attacking cryptography CTF challenges☆93Updated 4 months ago
- Source code for the 2022 DEF CON Finals.☆51Updated last year
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆43Updated last year
- Repository with the downloadable files and server files for the 2021 K3RN3LCTF.☆28Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆118Updated last year
- Fork of aeskeyfind that knows more formats of AES key schedule☆60Updated 7 years ago
- A tool to perform so called BGE attack☆20Updated 5 months ago