Infer internal state of Mersenne Twister from truncated output
☆77Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for not_random
Users that are interested in not_random are comparing it to the libraries listed below
Sorting:
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆99Apr 20, 2021Updated 4 years ago
- A repository trying to collect things related to LLL☆74Sep 10, 2024Updated last year
- Some crypto scripts which is useful in study and ctf☆29Sep 2, 2021Updated 4 years ago
- Cryptography & CTF Writeups☆82Feb 20, 2023Updated 3 years ago
- shw's CTF challenges☆27Apr 5, 2021Updated 4 years ago
- Cracking psuedorandom stuffs.☆24Jan 14, 2026Updated 2 months ago
- ☆38Jul 8, 2023Updated 2 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- LLL, MLL, BKZ, etc.☆10Dec 22, 2020Updated 5 years ago
- ctfs-2020☆17Mar 15, 2020Updated 6 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- Seed recovery tool for PRNGs☆387Sep 17, 2018Updated 7 years ago
- Implementation of known practical attack on some AES variant☆16Apr 3, 2024Updated last year
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Apr 8, 2020Updated 5 years ago
- ☆42Jun 27, 2022Updated 3 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆50Dec 31, 2023Updated 2 years ago
- Typora theme based on the CryptoHack blog☆33Mar 24, 2021Updated 4 years ago
- Making GO reversing easier in IDA Pro☆17Aug 8, 2019Updated 6 years ago
- ☆13Mar 3, 2021Updated 5 years ago
- CodeChain monitoring tool☆11Apr 5, 2019Updated 6 years ago
- Tool to archive RPM packages and attest to their authenticity☆15Jun 5, 2025Updated 9 months ago
- AES implementation for Cairo☆27Feb 27, 2022Updated 4 years ago
- A tweakable block cipher☆31May 17, 2024Updated last year
- ☆24Sep 12, 2024Updated last year
- Cryptonita - cryptanalysis swiss army knife☆14Jan 24, 2026Updated last month
- The CodeChain miner for blake_pow☆12Jun 15, 2022Updated 3 years ago
- Linux kernel and browser exploit scripts for ctf challenges☆15Apr 24, 2025Updated 10 months ago
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆23Feb 28, 2025Updated last year
- Safe Qubes OS screenshot tool with active VM detection & window border removal features☆15Nov 28, 2024Updated last year
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456☆21Dec 2, 2021Updated 4 years ago
- Python code for doing k-Best or List decoding with the Viterbi algorithm☆18May 4, 2017Updated 8 years ago
- ☆24Mar 4, 2025Updated last year
- [C++] Latest Visual-Studio 2005/2008 Project Of JKDefrag Source-Code. Fixed (Will Compile 100%)☆10Jun 20, 2022Updated 3 years ago
- Writeups/Code for the CTFs I participate in☆13Feb 9, 2023Updated 3 years ago
- Official QEMU mirror. Please see http://wiki.qemu.org/Contribute/SubmitAPatch for how to submit changes to QEMU. Pull Requests are ignore…☆17Dec 2, 2025Updated 3 months ago
- My CTF tasks and writeup☆38Dec 6, 2022Updated 3 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆123Dec 21, 2024Updated last year