Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.
☆47Jul 25, 2015Updated 10 years ago
Alternatives and similar repositories for mersenne-twister-recover
Users that are interested in mersenne-twister-recover are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool to perform so called BGE attack☆26Jun 13, 2025Updated 9 months ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆10May 28, 2017Updated 8 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆99Apr 20, 2021Updated 4 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- ☆26Feb 20, 2025Updated last year
- Implementation of Lattice Attacks on (EC)DSA described in the research paper: Chao Sun,Thomas Espitau, Mehdi Tibouchi, and Masayuki Abe, …☆27Oct 7, 2021Updated 4 years ago
- Some crypto scripts which is useful in study and ctf☆29Sep 2, 2021Updated 4 years ago
- Although the Mersenne Twister PRNG is by design not cryptographically secure many applications tend to use it for cryptographic operation…☆28Oct 23, 2015Updated 10 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- Simple 16-bit x86 decompression algorithm☆15Aug 7, 2017Updated 8 years ago
- ☆16Jan 23, 2026Updated 2 months ago
- Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.☆33May 7, 2023Updated 2 years ago
- Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper☆84Apr 13, 2022Updated 3 years ago
- xinetd-kafel is a more secure replacement for xinetd with secure computing (seccomp, only work on linux)☆18Jun 9, 2018Updated 7 years ago
- Analyse PNG file format for CTF, python API and CLI☆104Apr 7, 2023Updated 2 years ago
- ACPI Shutdown Hack in 512 bytes of Assembly☆11Jun 20, 2021Updated 4 years ago
- Forked from dji-sdk/Tello-Python and is being rewritting with Python3☆16Dec 24, 2018Updated 7 years ago
- Cryptonita - cryptanalysis swiss army knife☆14Jan 24, 2026Updated 2 months ago
- ☆37Sep 18, 2023Updated 2 years ago
- Infer internal state of Mersenne Twister from truncated output☆77Jul 28, 2022Updated 3 years ago
- An alternative to sudo and doas written in Rust☆14Jan 31, 2021Updated 5 years ago
- RiSC 16 is a simple 16 bit instruction set with 8 instructions and 3 instruction formats. This is an RTL implementation in verilog, instr…☆12Jan 24, 2022Updated 4 years ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- windows inlinehook R3 R0☆11Apr 11, 2018Updated 7 years ago
- IA-64 emulator☆15Aug 13, 2021Updated 4 years ago
- 📂 Everything you need to know about the current directory in one command.☆10Aug 18, 2021Updated 4 years ago
- Implementation of the signature scheme SQISign accompanying the paper "New algorithms for the Deuring correspondence - Towards practical …☆17May 17, 2024Updated last year
- Tasks and services for PASECA CTF 2019 (24-26 aug)☆21Mar 20, 2021Updated 5 years ago
- DKMS build for missing kmod dummy_hcd in Ubuntu☆12Aug 10, 2017Updated 8 years ago
- A Wargame based on the Matasano Crypto Challenges☆70Jun 3, 2016Updated 9 years ago
- Analysis and generation of substitutions☆25Oct 19, 2025Updated 5 months ago
- ☆12Jun 20, 2020Updated 5 years ago
- some WEC/WINCE booloader☆14Jun 20, 2019Updated 6 years ago
- CTF challenge solutions and writeups☆11Mar 2, 2024Updated 2 years ago
- jsproxy助手是一款jsproxy代理的chrome插件☆11Jun 22, 2019Updated 6 years ago
- ⌨️ RISC-V NS16550A UART driver☆11Mar 24, 2021Updated 5 years ago
- Tiny libubsan implementation for hobby kernels☆33Mar 26, 2022Updated 3 years ago