πIntroduction to lattice-based attacks in cryptanalysis
β14May 6, 2024Updated last year
Alternatives and similar repositories for lattice-based-attacks
Users that are interested in lattice-based-attacks are comparing it to the libraries listed below
Sorting:
- Kernel exploits and writeupsβ17May 11, 2022Updated 3 years ago
- File integrity monitor with malware detection using machine learningβ14May 23, 2024Updated last year
- Elliptic curve calculator with the curve: Secp256k1β31Dec 8, 2024Updated last year
- All the project is about to get Armbian (Tested on version Jammy-current) on Odroid HC4 without erase petitboot partition on your board.β11Feb 11, 2024Updated 2 years ago
- Pollardβs Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known rangeβ36Dec 7, 2022Updated 3 years ago
- A Python based ECDSA secp256k1 private key recovery toolβ33Mar 18, 2024Updated last year
- A crawler for kernel releases distributed by the major Linux distributions.β13Oct 18, 2024Updated last year
- β11Mar 9, 2018Updated 8 years ago
- The implementation of sdhash, the algorithm to calculate similarity digests, rewritten in pure go language πΉβ10Jan 17, 2021Updated 5 years ago
- Netcap Tensorflow Deep Neural Networkβ15Apr 26, 2020Updated 5 years ago
- dump private key from btc wallet dat fileβ14Jan 29, 2022Updated 4 years ago
- Limit USB devices plugged to a linux hostβ12Feb 12, 2018Updated 8 years ago
- β10May 6, 2021Updated 4 years ago
- FPGA implementation of SKLearn Random Forestβ10Dec 12, 2016Updated 9 years ago
- Ansible playbooks to provision firecracker VMs and run Falco kernel testsβ14Mar 2, 2026Updated last week
- A heuristic, python-based detector for fast-flux botnets.β13Feb 24, 2012Updated 14 years ago
- ETW-Almulahaza is a consumer python-based tool that help you monitor ETW events of the operating systemβ13Jun 24, 2022Updated 3 years ago
- A Windows Bitcoin wallet password recovery toolβ11Nov 30, 2020Updated 5 years ago
- A collection of random scripts.β10Jul 20, 2015Updated 10 years ago
- An index of blocklists and a tool to extract CIDRs to use in firewalls and network appliances.β12Aug 3, 2023Updated 2 years ago
- A framework that correlates Bro eventsβ18Oct 25, 2013Updated 12 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)β16Jul 5, 2021Updated 4 years ago
- An auto clicker for Windows written in Python 3β15Sep 3, 2017Updated 8 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)β13Nov 22, 2023Updated 2 years ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.β13Jul 19, 2021Updated 4 years ago
- Building an Automated Perimeter Scanning System with Open Source Tools - NMAP, IVRE and Netboxβ14May 5, 2023Updated 2 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiersβ60Apr 29, 2022Updated 3 years ago
- Simple Python 3 web crawlerβ13Jan 23, 2020Updated 6 years ago
- BSidesVienna Homepageβ16Updated this week
- β10Mar 19, 2021Updated 4 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)β15Dec 26, 2019Updated 6 years ago
- β15Aug 16, 2022Updated 3 years ago
- A weather monitoring Dashboard built upon Python and Yahoo APIβ14Jun 10, 2015Updated 10 years ago
- Ansible/Packer/Terraform setup for our Bambi CTF on Hetzner Cloudβ20Sep 10, 2025Updated 5 months ago
- Simple example of using Django, the Bing search API, and google page rank.β17Aug 11, 2012Updated 13 years ago
- Terminal Forensics CheatSheetsβ13Jul 28, 2015Updated 10 years ago
- Threat Simulator for Enterprise Networksβ14May 14, 2022Updated 3 years ago
- Android version of the open source, encrypted, peer-to-peer, Beechat app.β12Oct 3, 2022Updated 3 years ago
- Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.β19Apr 6, 2024Updated last year