mimoo / RSA-and-LLL-attacks
attacking RSA via lattice reductions (LLL)
☆793Updated 3 years ago
Alternatives and similar repositories for RSA-and-LLL-attacks:
Users that are interested in RSA-and-LLL-attacks are comparing it to the libraries listed below
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆513Updated last year
- Contains tools for solving RSA and other crypto problems in CTFs.☆320Updated 2 years ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆128Updated last year
- Coppersmith's method for multivariate polynomials☆159Updated last year
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆174Updated 4 years ago
- A docker environment for pwn in ctf☆758Updated last year
- Working with numbers (primes, modular, etc.)☆241Updated 2 years ago
- Build a database of libc offsets to simplify exploitation☆1,745Updated 4 months ago
- CTF write-ups by Plaid Parliament of Pwning☆779Updated 9 months ago
- Provide powerful tools for seccomp analysis☆1,019Updated this week
- ☆1,008Updated last year
- Unofficial mirror of yafu. Go to https://github.com/bbuhrow/yafu☆202Updated 3 years ago
- A Return-oriented Programming toolkit☆350Updated 7 years ago
- Python implementations of cryptographic attacks and utilities.☆1,024Updated last month
- CTF writeups from Balsn☆476Updated 2 years ago
- gdb for pwn☆909Updated 6 months ago
- Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.☆1,759Updated 5 years ago
- 💖CTF pwn framework.☆343Updated 2 years ago
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,098Updated 3 years ago
- ☆648Updated 2 weeks ago
- Pure Python hash length extension module☆123Updated 2 years ago
- Small python module for common CTF crypto functions☆166Updated 2 years ago
- glibc offset search for ctf.☆730Updated 2 years ago
- Predict python's random module generated values.☆398Updated 3 months ago
- The best tool for finding one gadget RCE in libc.so.6☆2,134Updated last week
- For Linux binary Exploitation☆828Updated 6 years ago
- Some pwn challenges selected for training and education.☆382Updated last year
- Implementation of attacks on cryptosystems☆71Updated 3 years ago
- Documentation for the angr suite☆843Updated last year
- A docker repository for deploying pwnable challenges in CTF☆402Updated 6 years ago