Hosting awesome cryptography CTF challenges from past CTFs
☆134Jun 18, 2025Updated 9 months ago
Alternatives and similar repositories for ctf_archive
Users that are interested in ctf_archive are comparing it to the libraries listed below
Sorting:
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- My CTF challenges, especially cryptography☆25Mar 4, 2025Updated last year
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- A toolkit for cryptanalysis using lattices.☆138Dec 2, 2023Updated 2 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆138Apr 17, 2023Updated 2 years ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Solving linear systems over GF(2) by manipulating bitvectors☆83Feb 12, 2026Updated last month
- ☆67Nov 10, 2025Updated 4 months ago
- Challenges I created for CTF competitions.☆243Dec 28, 2025Updated 2 months ago
- Challenge source code and author write-ups for KalmarCTF☆70Jan 7, 2026Updated 2 months ago
- ☆23Jul 18, 2023Updated 2 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- A community driven resource for learning CryptoGraphy☆71Apr 19, 2023Updated 2 years ago
- ☆37Sep 18, 2023Updated 2 years ago
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- CVP "trick" for CTF challenges☆149Jun 19, 2023Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 3 years ago
- Challenge source code, official writeups, and infrastructure setup for UIUCTF 2023☆39Jul 13, 2023Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆91Mar 23, 2023Updated 2 years ago
- Challenge source code and deployment scripts for UIUCTF 2022☆32Aug 9, 2022Updated 3 years ago
- (Still exploring) My cryptography journey: A collection of notebooks covering different algorithms and concepts from cryptography☆251Jul 6, 2023Updated 2 years ago
- A White-Box Masking Scheme Against Computational and Algebraic Attacks☆13Jan 6, 2021Updated 5 years ago
- aNOther CTF platform☆30Jan 23, 2026Updated last month
- Python implementations of cryptographic attacks and utilities.☆1,242Jan 8, 2026Updated 2 months ago
- HITCON 2023 x DEVCORE Wargame☆22Aug 24, 2023Updated 2 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆27Oct 7, 2021Updated 4 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Jul 14, 2024Updated last year
- ☆113Apr 22, 2025Updated 11 months ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- Coppersmith's method for multivariate polynomials☆195Oct 11, 2023Updated 2 years ago
- Infrastructure for the Potluck CTF☆25Mar 11, 2024Updated 2 years ago
- Fast lattice reduction☆233Aug 25, 2025Updated 6 months ago
- CTF writeups☆12Aug 10, 2020Updated 5 years ago