Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
☆1,596Jun 19, 2021Updated 4 years ago
Alternatives and similar repositories for Crypton
Users that are interested in Crypton are comparing it to the libraries listed below
Sorting:
- Python implementations of cryptographic attacks and utilities.☆1,233Jan 8, 2026Updated last month
- Contains tools for solving RSA and other crypto problems in CTFs.☆336Mar 25, 2022Updated 3 years ago
- CVP "trick" for CTF challenges☆150Jun 19, 2023Updated 2 years ago
- A repository for learning various heap exploitation techniques.☆8,455Jan 15, 2026Updated last month
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,800Feb 23, 2026Updated last week
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆143Mar 13, 2024Updated last year
- CTF write-ups☆218Feb 12, 2025Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,820Jun 8, 2019Updated 6 years ago
- Small python module for common CTF crypto functions☆167Aug 28, 2022Updated 3 years ago
- Some setup scripts for security research tools.☆9,299Feb 22, 2026Updated last week
- Coppersmith's method for multivariate polynomials☆193Oct 11, 2023Updated 2 years ago
- Ctf solutions from p4 team☆1,836Sep 18, 2024Updated last year
- A tool to analyze multi-byte xor cipher☆1,477May 21, 2025Updated 9 months ago
- Google CTF☆4,905Feb 11, 2026Updated 2 weeks ago
- CTF framework and exploit development library☆13,278Feb 23, 2026Updated last week
- Course materials for Modern Binary Exploitation by RPISEC☆5,936Dec 9, 2021Updated 4 years ago
- A toolkit for cryptanalysis using lattices.☆137Dec 2, 2023Updated 2 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- A collection of links related to Linux kernel security and exploitation☆6,353Jan 26, 2026Updated last month
- Cryptography & CTF Writeups☆83Feb 20, 2023Updated 3 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,301Updated this week
- A curated list of CTF frameworks, libraries, resources and softwares☆11,291Jul 22, 2024Updated last year
- Web CTF CheatSheet 🐈☆2,931Oct 28, 2025Updated 4 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,147Sep 10, 2023Updated 2 years ago
- For Linux binary Exploitation☆844Mar 26, 2018Updated 7 years ago
- A repository trying to collect things related to LLL☆73Sep 10, 2024Updated last year
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- A collection of pwn/CTF related utilities for Ghidra☆702Sep 10, 2024Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- Using Intel's PIN tool to solve CTF problems☆507Apr 12, 2020Updated 5 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆5,755Apr 3, 2024Updated last year
- An archive of low-level CTF challenges developed over the years☆653Nov 28, 2021Updated 4 years ago
- Perfect Blue's CTF Writeups☆694Jun 24, 2024Updated last year
- Exploit Development and Reverse Engineering with GDB & LLDB Made Easy☆10,128Updated this week
- Repository of various public white-box cryptographic implementations and their practical attacks.☆672Apr 10, 2024Updated last year
- Build a database of libc offsets to simplify exploitation☆1,854Oct 23, 2024Updated last year
- awesome list of browser exploitation tutorials☆2,267Sep 18, 2023Updated 2 years ago
- Collection of steganography tools - helps with CTF challenges☆2,640Nov 27, 2022Updated 3 years ago