cr-marcstevens / hashclashLinks
Project HashClash - MD5 & SHA-1 cryptanalysis
☆858Updated 2 months ago
Alternatives and similar repositories for hashclash
Users that are interested in hashclash are comparing it to the libraries listed below
Sorting:
- Predict python's random module generated values.☆419Updated 8 months ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆189Updated 4 years ago
- attacking RSA via lattice reductions (LLL)☆804Updated 4 years ago
- ☆1,137Updated 6 months ago
- ☆162Updated 7 years ago
- A web-based, accessible and open-source port of StegSolve.☆349Updated last year
- QR Code Analysis and Recovery Toolkit☆456Updated last year
- detect stegano-hidden data in PNG & BMP☆1,435Updated last year
- Many-Time Pad Interactive☆175Updated last year
- pkcrack with modern building tools☆194Updated 3 years ago
- Magic hashes – PHP hash "collisions"☆784Updated 4 months ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆331Updated 3 years ago
- A tool to analyze multi-byte xor cipher☆1,443Updated 2 months ago
- Automated integer factorization☆277Updated 3 weeks ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆134Updated last year
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆85Updated last year
- PCRT (PNG Check & Repair Tool), a tool to help check and fix the error in a PNG image.☆246Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆91Updated 4 years ago
- Pure Python hash length extension module☆126Updated 2 years ago
- Python implementations of cryptographic attacks and utilities.☆1,126Updated 6 months ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆524Updated last year
- Yet another Stego Tool☆389Updated 2 years ago
- Coppersmith's method for multivariate polynomials☆179Updated last year
- Padding oracle attack against PKCS7☆336Updated 2 years ago
- Provide powerful tools for seccomp analysis☆1,049Updated this week
- Perfect Blue's CTF Writeups☆685Updated last year
- Hash collisions and exploitations☆3,233Updated 5 months ago
- Build a database of libc offsets to simplify exploitation☆1,802Updated 9 months ago
- pwninit - automate starting binary exploit challenges☆962Updated 11 months ago