PoustouFlan / SUnbox
An open-source SBox analysis utility
☆12Updated last year
Alternatives and similar repositories for SUnbox:
Users that are interested in SUnbox are comparing it to the libraries listed below
- Some writeups for some CTFs☆16Updated 9 months ago
- A toolkit for cryptanalysis using lattices.☆108Updated last year
- ☆41Updated 3 weeks ago
- Functions for solving linear inequalities in integers☆41Updated 2 months ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆99Updated 3 weeks ago
- Coppersmith's method for multivariate polynomials☆158Updated last year
- ☆42Updated last year
- Source code of the challenges developed for the 2024 edition of openECSC☆63Updated 3 months ago
- SMT based attacks on non cryptographic PRNGs☆79Updated last year
- Hosting awesome cryptography CTF challenges from past CTFs☆106Updated this week
- CVP "trick" for CTF challenges☆125Updated last year
- A pure python tool to implement/exploit the hash length extension attack☆28Updated last year
- ☆28Updated last year
- Automatic tool to quickly start a pwn CTF challenge☆39Updated last year
- Write-ups for various CTF☆183Updated 10 months ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆71Updated 3 years ago
- ☆43Updated 2 years ago
- Docker image for attacking cryptography CTF challenges☆98Updated 8 months ago
- ☆8Updated last year
- Cryptography & CTF Writeups☆82Updated last year
- Solving linear systems over GF(2) by manipulating bitvectors☆32Updated 3 weeks ago
- Python sandbox escape wiki + payload generator☆68Updated 4 months ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆29Updated 2 months ago
- Source code and documentation for TeamItaly CTF 2023 challenges☆19Updated last year
- Network analysis tool for Attack Defence CTF☆292Updated 5 months ago
- libdebug is a python library to automate the debugging of a binary executable.☆139Updated this week
- Automated cryptanalysis of substitution permutation network cipher☆28Updated 4 months ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated 10 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆122Updated 10 months ago
- various docs (that are interesting, or not, depending on the point of view...)☆100Updated last year