cr-marcstevens / hashclashLinks
Project HashClash - MD5 & SHA-1 cryptanalysis
☆905Updated 8 months ago
Alternatives and similar repositories for hashclash
Users that are interested in hashclash are comparing it to the libraries listed below
Sorting:
- Predict python's random module generated values.☆431Updated last year
- ☆1,170Updated 11 months ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆197Updated 5 years ago
- attacking RSA via lattice reductions (LLL)☆828Updated 4 years ago
- pkcrack with modern building tools☆205Updated 4 years ago
- A tool to analyze multi-byte xor cipher☆1,468Updated 7 months ago
- ☆198Updated 8 years ago
- QR Code Analysis and Recovery Toolkit☆499Updated 4 months ago
- Many-Time Pad Interactive☆176Updated last year
- Magic hashes – PHP hash "collisions"☆813Updated 9 months ago
- A web-based, accessible and open-source port of StegSolve.☆365Updated last month
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆142Updated last year
- pwninit - automate starting binary exploit challenges☆1,051Updated last month
- Contains tools for solving RSA and other crypto problems in CTFs.☆336Updated 3 years ago
- detect stegano-hidden data in PNG & BMP☆1,529Updated 5 months ago
- Automated integer factorization☆317Updated last month
- Provide powerful tools for seccomp analysis☆1,089Updated 3 weeks ago
- Build a database of libc offsets to simplify exploitation☆1,846Updated last year
- Seed recovery tool for PRNGs☆385Updated 7 years ago
- The best tool for finding one gadget RCE in libc.so.6☆2,280Updated 3 weeks ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆99Updated 4 years ago
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆88Updated 3 weeks ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆590Updated last week
- Coppersmith's method for multivariate polynomials☆190Updated 2 years ago
- Perfect Blue's CTF Writeups☆694Updated last year
- Python implementations of cryptographic attacks and utilities.☆1,216Updated last week
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆536Updated last year
- Pure Python hash length extension module☆129Updated 2 years ago
- A Python3 implementation of the Wiener attack on RSA☆125Updated 2 months ago
- Hash collisions and exploitations☆3,315Updated 10 months ago