This repository contains code snippets and POCs associated to our article on breaking Python's PRNG with a few values and no bruteforce.
☆24Apr 18, 2024Updated last year
Alternatives and similar repositories for python-random-playground
Users that are interested in python-random-playground are comparing it to the libraries listed below
Sorting:
- ☆24Mar 4, 2025Updated last year
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- Cracking V8 Math.random() from arbitrary bit leaks☆35Updated this week
- A Text-Based Game Engine Made for Python☆15Aug 30, 2023Updated 2 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆43Nov 19, 2025Updated 4 months ago
- Solving linear systems over GF(2) by manipulating bitvectors☆83Feb 12, 2026Updated last month
- ☆67Nov 10, 2025Updated 4 months ago
- Cracking psuedorandom stuffs.☆24Jan 14, 2026Updated 2 months ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- Functions for solving linear inequalities in integers☆60Jul 27, 2025Updated 7 months ago
- Practical Implementation of the Maurer Reduction☆10Jul 13, 2023Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- 23–24 мая 2020 ⋅ Юниорские соревнования по информационной безопасности☆10Jun 14, 2020Updated 5 years ago
- A Sage interface for FGb (Gröbner basis computations)☆38Feb 1, 2026Updated last month
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆11Jul 9, 2014Updated 11 years ago
- ☆15Sep 2, 2024Updated last year
- BaseCTF Platform, based on GZCTF by @GZTimeWalker☆20Jan 16, 2025Updated last year
- ☆37Sep 18, 2023Updated 2 years ago
- Seed recovery tool for PRNGs☆41Nov 13, 2016Updated 9 years ago
- Python implementations of cryptographic attacks and utilities.☆1,242Jan 8, 2026Updated 2 months ago
- Исходные коды и решения 2 этапа НТО по Информационной Безопасности 2023 года от команды dtl☆13Nov 27, 2023Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆91Mar 23, 2023Updated 2 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Free and Open Platform for AI-assisted Computing☆10May 19, 2019Updated 6 years ago
- Fork of rsakeyfind☆20Aug 27, 2017Updated 8 years ago
- An ambitious theme for alacritty☆15Feb 23, 2024Updated 2 years ago
- ☆18Updated this week
- ☆114Jul 10, 2023Updated 2 years ago
- The world's first (and hopefully last) pure-bash implementation of the LLL algorithm☆19Aug 21, 2023Updated 2 years ago
- Writeups/Code for the CTFs I participate in☆13Feb 9, 2023Updated 3 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- Shor's algorithm simulation using CUDA☆19Nov 10, 2019Updated 6 years ago
- Automate the process of obtaining free Instagram followers using Mr. Insta.☆11Jul 9, 2023Updated 2 years ago
- my ctf chals☆11Jul 7, 2025Updated 8 months ago
- ☆10Jul 16, 2025Updated 8 months ago
- ☆13Feb 22, 2026Updated 3 weeks ago
- the centralized smart contract platform☆14Jan 5, 2025Updated last year
- A Linux Kernel Exploitation C Library☆19Oct 29, 2025Updated 4 months ago
- This utility is designed to create ISO installation media for Windows 11 ARM from ESD files in Microsoft's software distribution infrast…☆10Jan 11, 2024Updated 2 years ago