Symbolic execution for the XorShift128+ algorithm.
☆110May 2, 2025Updated 11 months ago
Alternatives and similar repositories for XorShift128Plus
Users that are interested in XorShift128Plus are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆80Apr 20, 2020Updated 5 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- RuCTF 2016 repository☆16Nov 16, 2019Updated 6 years ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- How to "crack" xoroshiro128+: from two outputs, derive a possible seed☆24Sep 9, 2024Updated last year
- Collection of somewhat useful stuff for CTF events☆37Jun 24, 2015Updated 10 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- RuCTFE 2015☆21Nov 25, 2015Updated 10 years ago
- ☆68Apr 13, 2020Updated 6 years ago
- Exact 64-bit convolution algorithm☆15Jun 7, 2016Updated 9 years ago
- Fuzzing compression libraries☆20Jan 10, 2016Updated 10 years ago
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- ☆30Oct 26, 2011Updated 14 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Dec 8, 2022Updated 3 years ago
- Using z3 to predict `Math.random` in v8☆343Jul 23, 2022Updated 3 years ago
- Pintool to detect Read before Write memory access☆22Mar 20, 2013Updated 13 years ago
- MongoDB Login Brute Forcer☆11Jun 22, 2014Updated 11 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 6 months ago
- The setup being used for mobile exploitation in the TCP1P CTF 2023☆13Nov 17, 2023Updated 2 years ago
- Belluminar 2016 Beijing stuff☆26Jun 3, 2016Updated 9 years ago
- Wireshark Post-Descriptors written in LUA☆13Apr 2, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆26Mar 11, 2025Updated last year
- A WebExtension for users of synchronized reading lists to add a Wikimedia wiki page from the browser.☆16Apr 23, 2020Updated 5 years ago
- Small scripts to simplify network communication☆27Dec 27, 2020Updated 5 years ago
- Kudelski Security's 2017 crypto challenge☆20Jul 6, 2017Updated 8 years ago
- This repository contains the setup from Paradigm CTF blockchain challenges based on the original repository. We've introduced new featur…☆48Oct 4, 2025Updated 6 months ago
- Generator of "nothing-up-my-sleeve" constants☆24Jul 3, 2015Updated 10 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Convert Challenge Binaries to shared objects so service pollers can make use of the algorithm implementations☆13Feb 1, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆17Sep 4, 2014Updated 11 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- An implementation of a generic unpacker based on Intel PIN☆29Jul 28, 2016Updated 9 years ago
- PoC for our attacks on MEGA.☆29Jun 6, 2022Updated 3 years ago
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Jan 8, 2017Updated 9 years ago
- Nsolv - A front-end that allows multiple SMTLIBv2 compliant solvers to executed in parallel.☆11Dec 7, 2012Updated 13 years ago
- Code samples used for the blog post☆24Jan 24, 2017Updated 9 years ago