fta2012 / ReplicatedRandomLinks
☆122Updated 8 years ago
Alternatives and similar repositories for ReplicatedRandom
Users that are interested in ReplicatedRandom are comparing it to the libraries listed below
Sorting:
- Seed recovery tool for PRNGs☆381Updated 7 years ago
- Symbolic execution for the XorShift128+ algorithm.☆109Updated 5 months ago
- Factoring as a Service☆269Updated 2 months ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆174Updated 5 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆438Updated 8 months ago
- Maven central doesn't do SSL when serving you JARs. Dilettante is a MiTM proxy for exploiting that.☆160Updated 7 months ago
- A tool for predicting the output of random number generators☆194Updated 8 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆233Updated 5 years ago
- ☆77Updated 10 years ago
- ☆1,147Updated 8 months ago
- Recovers V8 Math.random seed from outputs, even when they are not consecutive.☆32Updated 9 years ago
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆708Updated 8 years ago
- Seed recovery tool for PRNGs☆85Updated 9 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Updated 10 years ago
- ☆280Updated 5 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Updated 8 years ago
- Leak other players' temporary workspaces for ctf and wargames.☆86Updated 2 years ago
- Write JavaScript alert(1) with Katakana characters only☆146Updated 8 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆181Updated 10 years ago
- Files from my DEFCON CTF VM.☆270Updated 9 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆187Updated 5 years ago
- 2016 DEF CON Qualifier Challenges☆178Updated 9 years ago
- Sha256 vulnerability for full rounds. Circular hash attack.☆155Updated 8 years ago
- Tips, Tricks, and Suggestions for Running a CTF☆394Updated 3 years ago
- Here's a quick rundown of how I reversed the Casper API (https://casper.io)☆58Updated 8 years ago
- CTF Writeups☆189Updated 7 years ago
- How to backdoor Diffie-Hellman☆614Updated 9 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆103Updated 7 years ago