brimstone / fastcollLinks
☆186Updated 7 years ago
Alternatives and similar repositories for fastcoll
Users that are interested in fastcoll are comparing it to the libraries listed below
Sorting:
- Project HashClash - MD5 & SHA-1 cryptanalysis☆880Updated 4 months ago
- Automated integer factorization☆285Updated last week
- QR Code Analysis and Recovery Toolkit☆473Updated 3 weeks ago
- pkcrack with modern building tools☆196Updated 3 years ago
- Predict python's random module generated values.☆419Updated 9 months ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆191Updated 4 years ago
- ☆317Updated last year
- FactorDB client library with Python☆51Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆93Updated 4 years ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Updated 8 years ago
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆61Updated 3 years ago
- A web-based, accessible and open-source port of StegSolve.☆353Updated last year
- Python sandbox escape wiki + payload generator☆100Updated last year
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack. 使用明文攻击破解加密的 zip 文件☆107Updated 2 years ago
- PCRT (PNG Check & Repair Tool), a tool to help check and fix the error in a PNG image.☆247Updated 3 years ago
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆40Updated 2 years ago
- A tool to easily archive CTFd sites to GitHub Pages☆37Updated this week
- Source code for the DEF CON 30 CTF Qualifiers.☆264Updated last year
- Challenge source code and author write-ups for KalmarCTF☆68Updated 6 months ago
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆40Updated 5 years ago
- Implementation of https://eprint.iacr.org/2021/232☆94Updated 4 years ago
- Complex multiplication based factorization☆38Updated 3 years ago
- in preparation for the pyjail club☆46Updated 4 months ago
- Hosting awesome cryptography CTF challenges from past CTFs☆121Updated 3 months ago
- A deflate compressor that emits compressed data that is in the [A-Za-z0-9] ASCII byte range.☆174Updated 10 years ago
- SMT based attacks on non cryptographic PRNGs☆86Updated 2 years ago
- redpwn's CTF platform☆274Updated 7 months ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆332Updated 2 years ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆17Updated 10 months ago