elliptic-shiho / primefac-forkView external linksLinks
a fork of primefac(https://pypi.python.org/pypi/primefac) module
☆88Dec 25, 2025Updated last month
Alternatives and similar repositories for primefac-fork
Users that are interested in primefac-fork are comparing it to the libraries listed below
Sorting:
- FactorDB client library with Python☆53Apr 10, 2023Updated 2 years ago
- A Python3 implementation of the Wiener attack on RSA☆125Nov 3, 2025Updated 3 months ago
- A Sage implementation of the ROCA attack☆27May 16, 2023Updated 2 years ago
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆20Jun 8, 2021Updated 4 years ago
- Solutions to the security/cryptography problems at https://id0-rsa.pub☆20Apr 5, 2017Updated 8 years ago
- Complex multiplication based factorization☆40Feb 21, 2022Updated 3 years ago
- CVP "trick" for CTF challenges☆150Jun 19, 2023Updated 2 years ago
- ☆68Apr 13, 2020Updated 5 years ago
- RuCTF 2022. Developed with ♥ by Hackerdom team☆10May 22, 2022Updated 3 years ago
- Proof Of Concept that exploits PuTTy CVE-2024-31497.☆11May 11, 2024Updated last year
- ソーマ・カーネル・プロジェクト☆10Apr 12, 2017Updated 8 years ago
- Writeups of PICOCTF 2018☆11Feb 20, 2019Updated 6 years ago
- Code for "Small Public Exponent Brings More: Improved Partial Key Exposure Attacks against RSA"☆16Oct 8, 2025Updated 4 months ago
- Training materials for Security Camp 2020 (B7), a state-sponsored security education event in Japan☆14Oct 4, 2021Updated 4 years ago
- Breaking ECDSA (not so broken) with LLL☆91Nov 4, 2025Updated 3 months ago
- Code snippets for Qiling Tutorials☆21Aug 22, 2020Updated 5 years ago
- Python implementations of cryptographic attacks and utilities.☆1,227Jan 8, 2026Updated last month
- ☆38Jul 8, 2023Updated 2 years ago
- A tool to pull C++ object names from kernel memory☆16Aug 13, 2021Updated 4 years ago
- Implementation of RC4 and its FMS Attack☆19May 18, 2022Updated 3 years ago
- A pairing library of elliptic curve☆60Mar 4, 2024Updated last year
- Fastgcd is a C implementation of an efficient algorithm to compute the pairwise GCDs of a collection of integers. The algorithm is due to…☆17May 13, 2024Updated last year
- ☆42Jun 27, 2022Updated 3 years ago
- ☆16Apr 20, 2021Updated 4 years ago
- Based on original steghide, but improved with passwords brute force.☆20Nov 11, 2016Updated 9 years ago
- ☆19Mar 31, 2022Updated 3 years ago
- Collections of all CTF challenges made by me.☆19Apr 14, 2024Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆198Dec 29, 2020Updated 5 years ago
- Offical Writeups for n00bzCTF2023☆22Jun 15, 2023Updated 2 years ago
- Symbolic execution of LLVM IR traces for program understanding.☆27Feb 24, 2014Updated 11 years ago
- TrashDBG the world's worse debugger☆23Feb 17, 2022Updated 3 years ago
- Pyecm factors large integers (up to 50 digits) using the Elliptic Curve Method (ECM), a fast factoring algorithm.☆21Jan 17, 2022Updated 4 years ago
- Php Codz Hacking☆21Sep 5, 2015Updated 10 years ago
- Documentation & Tools for Marvell 88MW300/302 firmware☆23May 23, 2022Updated 3 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago