cr-marcstevens / hashclashLinks
Project HashClash - MD5 & SHA-1 cryptanalysis
☆867Updated 3 months ago
Alternatives and similar repositories for hashclash
Users that are interested in hashclash are comparing it to the libraries listed below
Sorting:
- Predict python's random module generated values.☆419Updated 8 months ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆190Updated 4 years ago
- ☆1,143Updated 7 months ago
- attacking RSA via lattice reductions (LLL)☆808Updated 4 years ago
- pkcrack with modern building tools☆195Updated 3 years ago
- ☆164Updated 7 years ago
- Many-Time Pad Interactive☆176Updated last year
- Automated integer factorization☆279Updated 2 weeks ago
- detect stegano-hidden data in PNG & BMP☆1,455Updated 3 weeks ago
- A web-based, accessible and open-source port of StegSolve.☆349Updated last year
- QR Code Analysis and Recovery Toolkit☆460Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆136Updated last year
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆526Updated last year
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆92Updated 4 years ago
- A Python3 implementation of the Wiener attack on RSA☆122Updated last year
- Contains tools for solving RSA and other crypto problems in CTFs.☆332Updated 3 years ago
- Python implementations of cryptographic attacks and utilities.☆1,137Updated 7 months ago
- Seed recovery tool for PRNGs☆382Updated 6 years ago
- A tool to analyze multi-byte xor cipher☆1,447Updated 3 months ago
- Pure Python hash length extension module☆126Updated 2 years ago
- Magic hashes – PHP hash "collisions"☆784Updated 5 months ago
- Provide powerful tools for seccomp analysis☆1,051Updated 3 weeks ago
- Display information about files in different file formats and find gadgets to build rop chains for different architectures (x86/x86_64, A…☆2,010Updated 5 months ago
- ☆1,045Updated last year
- Coppersmith's method for multivariate polynomials☆182Updated last year
- Build a database of libc offsets to simplify exploitation☆1,803Updated 10 months ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆110Updated 8 months ago
- Hash collisions and exploitations☆3,243Updated 6 months ago
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- Crack legacy zip encryption with Biham and Kocher's known plaintext attack.☆1,927Updated last week