elliptic-shiho / primefac-fork
a fork of primefac(https://pypi.python.org/pypi/primefac) module
☆71Updated 2 months ago
Related projects: ⓘ
- ☆62Updated 4 years ago
- A Python3 implementation of the Wiener attack on RSA☆105Updated 3 months ago
- Complex multiplication based factorization☆35Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆60Updated 3 years ago
- A repository trying to collect things related to LLL☆69Updated last week
- Hosting awesome cryptography CTF challenges from past CTFs☆100Updated last month
- Pure Python hash length extension module☆116Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆108Updated 6 months ago
- CVP "trick" for CTF challenges☆121Updated last year
- Coppersmith's method for multivariate polynomials☆150Updated 11 months ago
- Small python module for common CTF crypto functions☆164Updated 2 years ago
- SMT based attacks on non cryptographic PRNGs☆73Updated last year
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆163Updated 3 years ago
- ☆37Updated last year
- Implementation of attacks on cryptosystems☆69Updated 3 years ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆44Updated 9 years ago
- Miscellaneous utilities and such that I use for pwning. Open sourced since people might find these useful. Be warned: nothing is stable.☆128Updated 3 weeks ago
- Cryptography & CTF Writeups☆82Updated last year
- FactorDB client library with Python☆49Updated last year
- My CTF challenges, especially cryptography☆22Updated 8 months ago
- Implements Coron's simplification of Coppersmith's algorithm☆40Updated 11 months ago
- A full English version of the popular ctf-wiki☆74Updated 2 months ago
- A CTF platform used in IceCTF 2016☆66Updated 4 years ago
- rkm0959 implements stuff☆40Updated 2 years ago
- ☆27Updated 2 years ago
- CTF writeups☆41Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆26Updated 3 weeks ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆21Updated 2 years ago
- Working with numbers (primes, modular, etc.)☆238Updated 2 years ago
- Docker image for attacking cryptography CTF challenges☆93Updated 4 months ago