Cracking V8 Math.random() from arbitrary bit leaks
☆35Oct 1, 2025Updated 5 months ago
Alternatives and similar repositories for mathrandomcrack
Users that are interested in mathrandomcrack are comparing it to the libraries listed below
Sorting:
- An open-source SBox analysis utility☆19Mar 25, 2025Updated 11 months ago
- Solving linear systems over GF(2) by manipulating bitvectors☆82Feb 12, 2026Updated 2 weeks ago
- ☆23Mar 4, 2025Updated 11 months ago
- Challenges and write-ups for GCC-CTF 2024☆18Mar 3, 2024Updated last year
- This repository contains code snippets and POCs associated to our article on breaking Python's PRNG with a few values and no bruteforce.☆24Apr 18, 2024Updated last year
- Functions for solving linear inequalities in integers☆59Jul 27, 2025Updated 7 months ago
- ☆66Nov 10, 2025Updated 3 months ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- ☆37Sep 18, 2023Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆91Mar 23, 2023Updated 2 years ago
- M4RI is a library for fast arithmetic with dense matrices over GF(2)☆88Updated this week
- A page with resources, and problem editorials, relating to Cyprus Olympiad in Informatics☆10Feb 16, 2026Updated last week
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- ☆12Mar 10, 2024Updated last year
- ☆12Oct 24, 2025Updated 4 months ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- ☆10Jul 16, 2025Updated 7 months ago
- Regular expression Search on the command-line☆16Mar 31, 2025Updated 11 months ago
- Automated Wallpaper Management for Wayland Using Swaybg☆14Jan 5, 2026Updated last month
- ☆15Sep 2, 2024Updated last year
- Dummy services for an A/D CTF☆10May 25, 2023Updated 2 years ago
- ☆10Feb 1, 2022Updated 4 years ago
- ☆11May 7, 2019Updated 6 years ago
- Bibata Cursor, with support for hyprcursor and Xcursor☆19Jan 28, 2025Updated last year
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- CTF writeups by ./Vespiary☆16Nov 12, 2023Updated 2 years ago
- ☆10Jan 8, 2023Updated 3 years ago
- Implementation of some information-set decoding algorithms☆10Jul 21, 2021Updated 4 years ago
- use github as a cdn☆13Nov 17, 2025Updated 3 months ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- ReverseJS: A blog focused on reverse engineering Javascript☆10Feb 9, 2024Updated 2 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- A mod that enhances Facebook Messenger with loads of powerful features !☆12Apr 20, 2024Updated last year
- my ctf chals☆11Jul 7, 2025Updated 7 months ago
- Statement on Codegate Qualifiers 2023☆11Jun 19, 2023Updated 2 years ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆14May 14, 2024Updated last year
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- Challenge repository for ACSC 2024☆13Apr 2, 2024Updated last year
- A tool that recovers the public key used to sign JWT tokens☆130May 16, 2023Updated 2 years ago