A minimalist macOS app to convert a snap of Equation to LaTeX without paying
☆15Jun 14, 2024Updated last year
Alternatives and similar repositories for Snap2LaTeX
Users that are interested in Snap2LaTeX are comparing it to the libraries listed below
Sorting:
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- We implement the progressive Improved Progressive BKZ with Lattice Sieving presented in https://eprint.iacr.org/2022/1343, one can call i…☆13Feb 14, 2025Updated last year
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- my ctf chals☆11Jul 7, 2025Updated 8 months ago
- ☆37Sep 18, 2023Updated 2 years ago
- ☆18Feb 4, 2026Updated last month
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Jul 16, 2021Updated 4 years ago
- ☆15Oct 5, 2024Updated last year
- Build docker container for @MaskRay's pcap-search☆12Oct 19, 2018Updated 7 years ago
- AAA - 短学期安全攻防实践开源仓库☆124Jul 31, 2025Updated 7 months ago
- derper's mom☆13Oct 28, 2025Updated 4 months ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆99Apr 20, 2021Updated 4 years ago
- ☆67Nov 10, 2025Updated 4 months ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- The sec3 audit reports and publications☆11Feb 2, 2026Updated last month
- study https://github.com/n132/Libc-GOT-Hijacking☆15Dec 7, 2023Updated 2 years ago
- A rust and SageMath implementation of (2,2)-isogenies in the theta model☆25Jan 15, 2025Updated last year
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Attack & Defense CTF dashboard☆16Oct 7, 2021Updated 4 years ago
- A tools for terminal☆15Jul 15, 2024Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Collect simple coverage information in memory.☆11Oct 6, 2022Updated 3 years ago
- ida pro theme☆14Aug 20, 2018Updated 7 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Apr 17, 2023Updated 2 years ago
- ☆57Oct 15, 2020Updated 5 years ago
- ☆17Aug 15, 2023Updated 2 years ago
- RGFuzz: Rule-Guided Fuzzer for WebAssembly Runtimes☆23Jan 10, 2026Updated 2 months ago
- A PyTorch-Lightning based deep learning framework.☆11Dec 2, 2025Updated 3 months ago
- ☆112Apr 22, 2025Updated 10 months ago
- A list of awesome number theory resources☆33Dec 31, 2022Updated 3 years ago
- This tool calculates tricky canonical huffman histogram for CVE-2023-4863.☆26Dec 20, 2023Updated 2 years ago
- ☆11Nov 1, 2023Updated 2 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- ☆27Aug 19, 2024Updated last year
- ☆22Feb 18, 2025Updated last year
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 9 months ago
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆40Aug 1, 2020Updated 5 years ago
- Three Matrix-Multiplication-Algorithms: Generate Algorithm, Strassen Algorithm and Coppersmith-Winograd Algorithm☆29Oct 30, 2021Updated 4 years ago
- Painless C++ vtables & classes☆20Sep 21, 2022Updated 3 years ago