Typora theme based on the CryptoHack blog
☆33Mar 24, 2021Updated 4 years ago
Alternatives and similar repositories for typora-theme
Users that are interested in typora-theme are comparing it to the libraries listed below
Sorting:
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- A community driven resource for learning CryptoGraphy☆70Apr 19, 2023Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆100Apr 20, 2021Updated 4 years ago
- ☆36May 26, 2023Updated 2 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Docker image for attacking cryptography CTF challenges☆111Apr 29, 2024Updated last year
- A colour scheme for Sublime Text which is styled after Whitelines notepads☆17Oct 17, 2023Updated 2 years ago
- 🧩 Collection of CTF challenges written by me☆19Mar 30, 2025Updated 11 months ago
- CVP "trick" for CTF challenges☆150Jun 19, 2023Updated 2 years ago
- z3++☆29Dec 14, 2024Updated last year
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Apr 17, 2023Updated 2 years ago
- ☆22Sep 25, 2022Updated 3 years ago
- PoC for our attacks on MEGA.☆29Jun 6, 2022Updated 3 years ago
- A plugin for CTFd which adds functions for exporting/importing challenges from/to portable formats (currently YAML)☆27Jul 15, 2025Updated 7 months ago
- A wordlist-based encryption key brute forcer targeting weak key choice/derivation☆26Nov 21, 2018Updated 7 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year
- Mobile Legends Diamond Hack☆15Dec 5, 2017Updated 8 years ago
- CTF Write-ups☆29Apr 20, 2021Updated 4 years ago
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆28Oct 7, 2021Updated 4 years ago
- ☆33Jan 11, 2018Updated 8 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- single file ctf/exploit client library - python3, type annotated☆70Apr 15, 2023Updated 2 years ago
- ☆36Apr 24, 2024Updated last year
- A list of awesome number theory resources☆33Dec 31, 2022Updated 3 years ago
- LoadLibrary for offensive operations☆33Dec 14, 2021Updated 4 years ago
- Writeups for CTFs☆78Aug 20, 2025Updated 6 months ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- This was our Final Project for Distributed Computing. In this we had to create a distributed system that will use the Brute Force Algorit…☆11Aug 14, 2021Updated 4 years ago
- RDPThief donut shellcode inject into mstsc☆88May 24, 2021Updated 4 years ago
- Building the linear algebra game!☆10Dec 2, 2024Updated last year
- ctfs write-up☆30Jul 21, 2023Updated 2 years ago
- Mobile Legends Web Event Boosting Will generate random invites to Any Web Events by Mobile Legends☆10Apr 9, 2020Updated 5 years ago
- ☆37Sep 18, 2023Updated 2 years ago
- Aplikasi pantau harga yang dibuat dengan bahasa Java Android Native.☆12Dec 5, 2015Updated 10 years ago
- CTF platform we wrote and used for justCTF 2019☆12Jun 25, 2022Updated 3 years ago
- A JS library brings Adobe Experience Platform functionality to WeChat Mini Programs.☆13Apr 8, 2024Updated last year
- CTF Write-Ups☆19Jan 19, 2020Updated 6 years ago
- Numerical optimization code for classical and quantum subset-sum algorithms☆10Feb 14, 2020Updated 6 years ago