cr-marcstevens / hashclash
Project HashClash - MD5 & SHA-1 cryptanalysis
☆843Updated last week
Alternatives and similar repositories for hashclash
Users that are interested in hashclash are comparing it to the libraries listed below
Sorting:
- Hash collisions and exploitations☆3,193Updated 2 months ago
- ☆157Updated 7 years ago
- attacking RSA via lattice reductions (LLL)☆798Updated 4 years ago
- ☆1,121Updated 3 months ago
- pkcrack with modern building tools☆188Updated 3 years ago
- Predict python's random module generated values.☆406Updated 5 months ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆182Updated 4 years ago
- detect stegano-hidden data in PNG & BMP☆1,414Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆132Updated last year
- Automated integer factorization☆257Updated this week
- A tool to analyze multi-byte xor cipher☆1,432Updated 2 years ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆326Updated 3 years ago
- A docker environment for pwn in ctf☆761Updated last year
- Yet another Stego Tool☆378Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,106Updated 3 years ago
- Provide powerful tools for seccomp analysis☆1,036Updated last week
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- pwninit - automate starting binary exploit challenges☆935Updated 9 months ago
- Build two PDFs that have different content but identical SHA1 sums.☆432Updated 3 months ago
- Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems☆1,127Updated last year
- A web-based, accessible and open-source port of StegSolve.☆340Updated 9 months ago
- Coppersmith's method for multivariate polynomials☆165Updated last year
- Seed recovery tool for PRNGs☆381Updated 6 years ago
- Many-Time Pad Interactive☆171Updated last year
- Magic hashes – PHP hash "collisions"☆765Updated last month
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆80Updated 4 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆517Updated last year
- ☆1,028Updated last year
- Build a database of libc offsets to simplify exploitation☆1,782Updated 6 months ago
- Perfect Blue's CTF Writeups☆678Updated 10 months ago