Infer internal state of Mersenne Twister from truncated output
☆77Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for not_random
Users that are interested in not_random are comparing it to the libraries listed below
Sorting:
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆100Apr 20, 2021Updated 4 years ago
- Automated cryptanalysis of substitution permutation network cipher☆32Aug 27, 2024Updated last year
- A repository trying to collect things related to LLL☆73Sep 10, 2024Updated last year
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- Some crypto scripts which is useful in study and ctf☆29Sep 2, 2021Updated 4 years ago
- My CTF challenges, especially cryptography☆25Mar 4, 2025Updated 11 months ago
- Cryptography & CTF Writeups☆83Feb 20, 2023Updated 3 years ago
- CVP "trick" for CTF challenges☆150Jun 19, 2023Updated 2 years ago
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- Prime backdooring procedure to allow fast factorization of semiprimes☆25Dec 10, 2021Updated 4 years ago
- Code accompanying the paper "ApresSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing".☆10Mar 30, 2025Updated 11 months ago
- rkm0959 implements stuff☆45Sep 21, 2022Updated 3 years ago
- Coppersmith's method for multivariate polynomials☆193Oct 11, 2023Updated 2 years ago
- LLL, MLL, BKZ, etc.☆10Dec 22, 2020Updated 5 years ago
- Cryptonita - cryptanalysis swiss army knife☆14Jan 24, 2026Updated last month
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- advanced code generator for John the Ripper☆13May 6, 2018Updated 7 years ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Mar 9, 2024Updated last year
- shw's CTF challenges☆27Apr 5, 2021Updated 4 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆11Jan 6, 2022Updated 4 years ago
- Implementation of known practical attack on some AES variant☆16Apr 3, 2024Updated last year
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Solutions and Explanations for problems at https://id0-rsa.pub☆14Apr 8, 2020Updated 5 years ago
- ☆38Jul 8, 2023Updated 2 years ago
- An ASCII Art animation program working with FFmpeg and Qt. Some code is written in assembly.☆19Jan 7, 2022Updated 4 years ago
- Go package scrypt implements the scrypt key derivation function as defined in Colin Percival's paper "Stronger Key Derivation via Sequent…☆36Jan 17, 2013Updated 13 years ago
- ☆42Jun 27, 2022Updated 3 years ago
- SubR3con is a script written in python. It uses Sublist3r to enumerate all subdomains of a specific target and then it checks for status …☆18Jul 23, 2019Updated 6 years ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Jul 16, 2021Updated 4 years ago
- Cracking psuedorandom stuffs.☆23Jan 14, 2026Updated last month
- Hosting awesome cryptography CTF challenges from past CTFs☆131Jun 18, 2025Updated 8 months ago
- ☆23Mar 4, 2025Updated 11 months ago
- Python code for doing k-Best or List decoding with the Viterbi algorithm☆18May 4, 2017Updated 8 years ago
- A diverse collection of useful (to me!) software written in C. Memory profiling, http server, editor, crash reporter, clang plugin, torre…☆23Feb 28, 2025Updated last year
- ctfs-2020☆17Mar 15, 2020Updated 5 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- SMT based attacks on non cryptographic PRNGs☆91Mar 23, 2023Updated 2 years ago
- Repo for storing CTF related stuff (Writeups, etc.)☆50Dec 31, 2023Updated 2 years ago
- A very very fast VHDL implementation of the WPA2 encryption algorithm.☆26Jul 15, 2017Updated 8 years ago