elliptic-shiho / primefac-forkView external linksLinks
a fork of primefac(https://pypi.python.org/pypi/primefac) module
☆88Dec 25, 2025Updated last month
Alternatives and similar repositories for primefac-fork
Users that are interested in primefac-fork are comparing it to the libraries listed below
Sorting:
- FactorDB client library with Python☆53Apr 10, 2023Updated 2 years ago
- A Python3 implementation of the Wiener attack on RSA☆125Nov 3, 2025Updated 3 months ago
- A Sage implementation of the ROCA attack☆27May 16, 2023Updated 2 years ago
- Solutions to the security/cryptography problems at https://id0-rsa.pub☆20Apr 5, 2017Updated 8 years ago
- Complex multiplication based factorization☆40Feb 21, 2022Updated 3 years ago
- CVP "trick" for CTF challenges☆150Jun 19, 2023Updated 2 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- RuCTF 2022. Developed with ♥ by Hackerdom team☆10May 22, 2022Updated 3 years ago
- bSidesLisbon 2016 event contents☆10Dec 14, 2016Updated 9 years ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11May 11, 2024Updated last year
- Code for "Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA"☆16Oct 8, 2025Updated 4 months ago
- ☆27May 25, 2022Updated 3 years ago
- A toolkit for cryptanalysis using lattices.☆137Dec 2, 2023Updated 2 years ago
- Breaking ECDSA (not so broken) with LLL☆91Nov 4, 2025Updated 3 months ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- Python implementations of cryptographic attacks and utilities.☆1,227Jan 8, 2026Updated last month
- ☆38Jul 8, 2023Updated 2 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆143Mar 13, 2024Updated last year
- Implementation of RC4 and its FMS Attack☆19May 18, 2022Updated 3 years ago
- A tool to pull C++ object names from kernel memory☆16Aug 13, 2021Updated 4 years ago
- A pairing library of elliptic curve☆60Mar 4, 2024Updated last year
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- ☆19Mar 31, 2022Updated 3 years ago
- ☆16Apr 20, 2021Updated 4 years ago
- Collections of all CTF challenges made by me.☆19Apr 14, 2024Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆536Feb 24, 2024Updated last year
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- ☆24Nov 4, 2024Updated last year
- A collection of my CTF writeups☆23Updated this week
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆198Dec 29, 2020Updated 5 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 3 years ago
- Pyecm factors large integers (up to 50 digits) using the Elliptic Curve Method (ECM), a fast factoring algorithm.☆21Jan 17, 2022Updated 4 years ago
- Offical Writeups for n00bzCTF2023☆22Jun 15, 2023Updated 2 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Feb 24, 2014Updated 11 years ago
- Php Codz Hacking☆21Sep 5, 2015Updated 10 years ago