Solutions to https://cryptopals.com problems
☆28Apr 25, 2025Updated 10 months ago
Alternatives and similar repositories for cryptopals
Users that are interested in cryptopals are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆20Jul 16, 2021Updated 4 years ago
- This repository contains source code for Universal boot loader This repository contains source code for Universal boot loader for use wit…☆12Aug 19, 2025Updated 7 months ago
- Control a Fanimation Slinger V2 RF Fan via an ESP8266 and a TI CC1101 chip over MQTT☆11Jan 29, 2025Updated last year
- My bitcoin fork with many useful work branches for different purposes.☆14Sep 15, 2018Updated 7 years ago
- ECDSA nonce-reuse attack to recover a private key.☆51Nov 11, 2020Updated 5 years ago
- https://hub.docker.com/r/clangbuiltlinux/ubuntu/☆11Jan 20, 2021Updated 5 years ago
- A fast and unsafe version of an optimized C library for EC operations on curve secp256k1☆26Sep 18, 2023Updated 2 years ago
- Modular library for manipulating physically-uncloneable functions☆19Dec 17, 2016Updated 9 years ago
- A libusb based implementation of javax.usb☆45Apr 26, 2021Updated 4 years ago
- PoC CVE-2021-37980 : Inappropriate implementation in Sandbox (windows only)☆71Oct 14, 2021Updated 4 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- Formalization of the Rupert Problem for convex polyhedra.☆17Dec 15, 2025Updated 3 months ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- Python implementation of Wagner's Algorithm for the Generalized Birthday Problem.☆19Aug 15, 2023Updated 2 years ago
- ☆19Nov 12, 2020Updated 5 years ago
- pwn envs based on docker of ubuntu16.04,18.04,20.04☆10Dec 4, 2022Updated 3 years ago
- files for (μ)scope projects☆11Jul 8, 2019Updated 6 years ago
- Hardware Security Labs☆31May 3, 2017Updated 8 years ago
- the rounding error tool 🚩☆14May 16, 2025Updated 10 months ago
- Cryptographic Key Generation from PUF Data☆23Oct 29, 2019Updated 6 years ago
- An experimental sound engine for the web☆18Jun 6, 2025Updated 9 months ago
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS☆119Apr 10, 2017Updated 8 years ago
- Helm deployment charts for Wikimedia. Mirror from https://gerrit.wikimedia.org/g/operations/deployment-charts - our actual code is hosted…☆10Updated this week
- A configuration manager for your projects☆13Feb 1, 2022Updated 4 years ago
- A Clojure library designed to compress/decompress data.☆13Feb 4, 2020Updated 6 years ago
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- minimalist sudo alternative: multi-user privilege escalation tool in three letters☆10Jul 5, 2022Updated 3 years ago
- Lightweight animation library☆12Jan 2, 2025Updated last year
- Example plug-ins for GammaRay☆15Jun 4, 2018Updated 7 years ago
- Ask people anonymous questions on Slack.☆10Jun 23, 2015Updated 10 years ago
- Sweet B is a safe, compact, embeddable library for elliptic curve cryptography.☆37Aug 3, 2022Updated 3 years ago
- an Evil Java RMI Registry.☆50Feb 8, 2023Updated 3 years ago
- Ethereum Bug Bounty Submission: Breaking ecdsa that uses `privKey xor message` as nonce.☆33Aug 10, 2022Updated 3 years ago
- Multi-platform framework for games and applications☆11Feb 22, 2019Updated 7 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts using a list of various payloads.☆29Sep 4, 2025Updated 6 months ago
- ☆20May 9, 2023Updated 2 years ago
- Some writeups for some CTFs☆18Apr 14, 2024Updated last year
- x86 16-bit program drawing the heart curve equation☆17Feb 15, 2021Updated 5 years ago