fta2012 / ReplicatedRandomLinks
☆122Updated 8 years ago
Alternatives and similar repositories for ReplicatedRandom
Users that are interested in ReplicatedRandom are comparing it to the libraries listed below
Sorting:
- Seed recovery tool for PRNGs☆386Updated 7 years ago
- Symbolic execution for the XorShift128+ algorithm.☆109Updated 7 months ago
- Factoring as a Service☆273Updated 4 months ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 5 years ago
- Build two PDFs that have different content but identical SHA1 sums.☆440Updated 10 months ago
- A tool for predicting the output of random number generators☆194Updated 8 years ago
- Recovers V8 Math.random seed from outputs, even when they are not consecutive.☆32Updated 9 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Updated 10 years ago
- ☆1,158Updated 10 months ago
- Maven central doesn't do SSL when serving you JARs. Dilettante is a MiTM proxy for exploiting that.☆160Updated 10 months ago
- Tips, Tricks, and Suggestions for Running a CTF☆397Updated 3 years ago
- Leak other players' temporary workspaces for ctf and wargames.☆86Updated 2 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Seed recovery tool for PRNGs☆87Updated 9 years ago
- How to backdoor Diffie-Hellman☆613Updated 9 years ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆120Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆235Updated 5 years ago
- Files from my DEFCON CTF VM.☆273Updated 9 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 11 years ago
- Java Random sequence crackers materials☆13Updated 11 years ago
- The Internetwache CTF 2016 repository☆74Updated 4 years ago
- Pure Python hash length extension module☆129Updated 2 years ago
- ☆77Updated 10 years ago
- 2016 DEF CON Qualifier Challenges☆178Updated 9 years ago
- ☆170Updated 4 years ago
- Demonstrates the "heartbleed" problem using full OpenSSL stack☆709Updated 9 years ago
- Sha256 vulnerability for full rounds. Circular hash attack.☆156Updated 8 years ago
- ROCA: Infineon RSA key vulnerability☆491Updated 2 years ago
- Rowhammer.js - A Remote Software-Induced Fault Attack in JavaScript☆518Updated 5 months ago
- msieve - Number Field Sieve implementation by Jason Papadopoulos☆257Updated 2 years ago