eboda / mersenne-twister-recover
Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.
☆47Updated 9 years ago
Alternatives and similar repositories for mersenne-twister-recover:
Users that are interested in mersenne-twister-recover are comparing it to the libraries listed below
- SMT based attacks on non cryptographic PRNGs☆80Updated 2 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆175Updated 4 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆76Updated 3 years ago
- Infer internal state of Mersenne Twister from truncated output☆76Updated 2 years ago
- ☆66Updated 4 years ago
- Pure Python hash length extension module☆124Updated 2 years ago
- CVP "trick" for CTF challenges☆131Updated last year
- A repository trying to collect things related to LLL☆71Updated 6 months ago
- a fork of primefac(https://pypi.python.org/pypi/primefac) module☆81Updated 8 months ago
- Coppersmith's method for multivariate polynomials☆160Updated last year
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆42Updated last year
- A tool for finding the one gadget RCE in libc☆75Updated 4 years ago
- Small python module for common CTF crypto functions☆166Updated 2 years ago
- A Python3 implementation of the Wiener attack on RSA☆119Updated 9 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆128Updated last year
- rkm0959 implements stuff☆43Updated 2 years ago
- Small scripts to simplify network communication☆27Updated 4 years ago
- Complex multiplication based factorization☆37Updated 3 years ago
- z3++☆26Updated 3 months ago
- My CTF challenges, especially cryptography☆25Updated 3 weeks ago
- Many-Time Pad Interactive☆169Updated last year
- A full English version of the popular ctf-wiki☆90Updated 8 months ago
- Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.☆132Updated 7 months ago
- Symbolic execution for the XorShift128+ algorithm.☆101Updated 5 years ago
- An abstraction layer for constraint solvers.☆303Updated this week
- Implementation of attacks on cryptosystems☆71Updated 3 years ago
- My write-ups from various CTFs☆118Updated last year
- Cryptography & CTF Writeups☆82Updated 2 years ago
- CTF writeups☆12Updated 4 years ago
- Predict python's random module generated values.☆401Updated 4 months ago