fta2012 / ReplicatedRandomLinks
☆121Updated 8 years ago
Alternatives and similar repositories for ReplicatedRandom
Users that are interested in ReplicatedRandom are comparing it to the libraries listed below
Sorting:
- Seed recovery tool for PRNGs☆385Updated 7 years ago
- Factoring as a Service☆275Updated 6 months ago
- Symbolic execution for the XorShift128+ algorithm.☆110Updated 9 months ago
- Build two PDFs that have different content but identical SHA1 sums.☆442Updated last year
- A tool for predicting the output of random number generators☆193Updated 8 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆178Updated 5 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Updated 5 years ago
- Leak other players' temporary workspaces for ctf and wargames.☆85Updated 3 years ago
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆261Updated 2 years ago
- 2016 DEF CON Qualifier Challenges☆178Updated 9 years ago
- Maven central doesn't do SSL when serving you JARs. Dilettante is a MiTM proxy for exploiting that.☆160Updated last year
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆399Updated 3 years ago
- How to backdoor Diffie-Hellman☆612Updated 9 years ago
- ☆1,177Updated last year
- A Javascript library for browser exploitation☆894Updated 6 years ago
- Pure Python hash length extension module☆130Updated 3 years ago
- Java Random sequence crackers materials☆13Updated 11 years ago
- ☆280Updated 5 years ago
- Files from my DEFCON CTF VM.☆273Updated 9 years ago
- Seed recovery tool for PRNGs☆88Updated 10 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆182Updated 11 years ago
- CTF Writeups☆190Updated 8 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- Sha256 vulnerability for full rounds. Circular hash attack.☆156Updated 8 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆522Updated 7 months ago
- DNS rebinding is powerful: how to steal WiFi passwords by just tricking a victim into visiting a website, thanks to that fancy Bang & Olu…☆81Updated 6 years ago
- The Internetwache CTF 2016 repository☆74Updated 4 years ago
- ☆77Updated 10 years ago
- Recovers V8 Math.random seed from outputs, even when they are not consecutive.☆32Updated 9 years ago