fx5 / not_random
Infer internal state of Mersenne Twister from truncated output
☆76Updated 2 years ago
Alternatives and similar repositories for not_random:
Users that are interested in not_random are comparing it to the libraries listed below
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆79Updated 4 years ago
- A repository trying to collect things related to LLL☆71Updated 7 months ago
- CVP "trick" for CTF challenges☆133Updated last year
- ☆66Updated 5 years ago
- SMT based attacks on non cryptographic PRNGs☆80Updated 2 years ago
- Complex multiplication based factorization☆37Updated 3 years ago
- rkm0959 implements stuff☆43Updated 2 years ago
- Coppersmith's method for multivariate polynomials☆163Updated last year
- Cryptography & CTF Writeups☆82Updated 2 years ago
- ☆37Updated last year
- Implementation of attacks on cryptosystems☆72Updated 3 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆22Updated 3 years ago
- Leak other players' temporary workspaces for ctf and wargames.☆86Updated 2 years ago
- visualizing CTF clusters (teams playing together at DEFCON quals 2022)☆41Updated last year
- Pure Python hash length extension module☆124Updated 2 years ago
- Given at least 624 outputs of a Mersenne Twister PNRG we can restore its internal state.☆47Updated 9 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆132Updated last year
- For effective cheating detection in security competitions. Uses Linux Kernel Module (LKM) for generating flags.☆67Updated 2 years ago
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Updated 5 years ago
- SageMath/Python Toolkit for Cryptanalytic Research☆39Updated 2 years ago
- Solving linear systems over GF(2) by manipulating bitvectors☆38Updated 3 weeks ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆128Updated 2 years ago
- Small python module for common CTF crypto functions☆166Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆31Updated 8 months ago
- A tool for finding the one gadget RCE in libc☆76Updated 4 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆104Updated 4 months ago
- Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5☆42Updated 6 years ago
- My CTF challenges, especially cryptography☆25Updated last month
- Implementation of https://eprint.iacr.org/2021/232☆93Updated 4 years ago