Solving ECDLP with Kangaroos - Part #2
☆38Jan 1, 2025Updated last year
Alternatives and similar repositories for Kang-2
Users that are interested in Kang-2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Solving ECDLP with Kangaroos - Part #1☆52Feb 10, 2026Updated last month
- Fast ECDLP Solver for Nvidia GPUs based on SOTA method (Kangaroo with symmetry)☆126Nov 19, 2025Updated 4 months ago
- Pollard's kangaroo for SECPK1☆35Jun 22, 2024Updated last year
- Implementation of the Pollard's Rho algorithm for the secp256k1 curve.☆18Mar 18, 2026Updated last week
- Tools for btc hacking☆14Feb 21, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Kangaroo with the goal of improving efficiency without losing the success rate.☆16Dec 13, 2024Updated last year
- Generate BTC address pair that share the same prefix☆84Jan 30, 2020Updated 6 years ago
- A powerful solution for tackling the Elliptic Curve Discrete Logarithm Problem (ECDLP) within the context of secp256k1.☆11Dec 13, 2025Updated 3 months ago
- VanitySearch-Bitcrack for BTC Puzzle with CUDA optimization☆62May 16, 2025Updated 10 months ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- ☆77Aug 13, 2023Updated 2 years ago
- Small universal base64url functions for node.js and browsers☆17Jun 24, 2025Updated 9 months ago
- This code generates random set of bitcoin public and private keys in order to solve the existing puzzles. You may find some of these puzz…☆18Oct 7, 2021Updated 4 years ago
- A Python script to help solve the 0.2 BTC Puzzle by testing custom identified seed words against a target address☆12Aug 26, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Brute force Bitcoin public keys for puzzle translation.☆18May 1, 2024Updated last year
- Create your token launchpad or token sale website and start selling your token super easy, Your users can pay using MetaMask wallet or di…☆20Jun 25, 2023Updated 2 years ago
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- A Python based ECDSA secp256k1 private key recovery tool☆33Mar 18, 2024Updated 2 years ago
- 以太坊智能合约的部署☆18Jul 3, 2020Updated 5 years ago
- Stripped down version of Tachyons for developing with Google AMP☆19Sep 25, 2022Updated 3 years ago
- STM32 Hiperface Encoder circuit and software☆11Nov 14, 2023Updated 2 years ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- Crack encrypted master Key (AES 256 CBC with Padding)☆117Jan 11, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A C++ class that adds arbitrary precision integers aimed at high performance and ease of use. All you need to do is replace int with huge…☆12Mar 6, 2024Updated 2 years ago
- Изучение C++ и алгоритмов CV на спец. курсе для 11 классов ФМЛ №239☆10Sep 5, 2024Updated last year
- Automates Flatcam generation of G-code for my (and maybe your) PCB milling process☆10Jun 16, 2023Updated 2 years ago
- C library for ECC-SM2 public encrypt☆10Dec 17, 2016Updated 9 years ago
- Pollard's kangaroo for SECPK1☆349May 19, 2024Updated last year
- Two/three USB-to-serial bridges with build in Forth for STM32F103☆12Apr 2, 2019Updated 6 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- Universal controller for Unipolar stepper motors with encoders and end switches☆12Feb 22, 2016Updated 10 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆10Oct 29, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Small universal base64 functions for node.js and browsers☆29Feb 27, 2026Updated 3 weeks ago
- KeyHuntCuda Program to work with BTC Challenge Pool Client☆27Aug 29, 2021Updated 4 years ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- Fabrication of an IGBT using Silvaco TCAD☆18Mar 12, 2017Updated 9 years ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Feb 5, 2018Updated 8 years ago
- Automated device to apply solder paste onto a PCB without using a stencil.☆12Dec 2, 2021Updated 4 years ago