brimstone / fastcollLinks
☆164Updated 7 years ago
Alternatives and similar repositories for fastcoll
Users that are interested in fastcoll are comparing it to the libraries listed below
Sorting:
- pkcrack with modern building tools☆195Updated 3 years ago
- Automated integer factorization☆279Updated 3 weeks ago
- Given p xor q and n=p*q for two unknown primes p and q, factor n and output p and q.☆22Updated 8 years ago
- Project HashClash - MD5 & SHA-1 cryptanalysis☆867Updated 3 months ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆190Updated 4 years ago
- Predict python's random module generated values.☆419Updated 8 months ago
- QR Code Analysis and Recovery Toolkit☆460Updated last year
- FactorDB client library with Python☆51Updated 2 years ago
- Predict and Backtrack MT19937 PRNG by putting 32 * 624 bits generated numbers. Python "random" standard library uses mt19937, so we can …☆39Updated 2 years ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆92Updated 4 years ago
- PCRT (PNG Check & Repair Tool), a tool to help check and fix the error in a PNG image.☆247Updated 2 years ago
- ☆317Updated last year
- Python implementation of a symbolic execution of MT19937 and a solver for GF(2) matrices☆40Updated 5 years ago
- A web-based, accessible and open-source port of StegSolve.☆349Updated last year
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack. 使用明文攻击破解加密的 zip 文件☆105Updated 2 years ago
- Complex multiplication based factorization☆38Updated 3 years ago
- Implementation of https://eprint.iacr.org/2021/232☆94Updated 4 years ago
- Automated solver of classic CTF pwn challenges, with flexibility in mind.☆62Updated 3 years ago
- Challenges I created for CTF competitions.☆210Updated 4 months ago
- A Python3 implementation of the Wiener attack on RSA☆122Updated last year
- A deflate compressor that emits compressed data that is in the [A-Za-z0-9] ASCII byte range.☆174Updated 10 years ago
- nc 类题目的 Docker 容器资源限制、动态 flag、网页终端☆70Updated 9 months ago
- CRC32 tools: reverse, undo/rewind, and calculate hashes☆358Updated 11 months ago
- SMT based attacks on non cryptographic PRNGs☆85Updated 2 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Updated 4 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆110Updated 8 months ago
- Solving linear systems over GF(2) by manipulating bitvectors☆54Updated 4 months ago
- Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly re…☆330Updated 2 years ago
- Source code for the DEF CON 30 CTF Qualifiers.☆264Updated last year