Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.
☆24Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for CRYPTO
Users that are interested in CRYPTO are comparing it to the libraries listed below
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 10 months ago
- A Sage implementation of the ROCA attack☆28May 16, 2023Updated 2 years ago
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- Two-factor Bitcoin (BIP38)☆36Mar 22, 2015Updated 10 years ago
- Tools for btc hacking☆12Feb 21, 2021Updated 5 years ago
- CryptoKeyHunter is a Python script that generates an unlimited number of Bitcoin addresses and keys, checks them against a list of target…☆11Oct 8, 2024Updated last year
- A powerful solution for tackling the Elliptic Curve Discrete Logarithm Problem (ECDLP) within the context of secp256k1.☆11Dec 13, 2025Updated 2 months ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- ☆12Oct 7, 2019Updated 6 years ago
- Kangaroo with the goal of improving efficiency without losing the success rate.☆16Dec 13, 2024Updated last year
- 32btc bounty address search on GPU☆19Jan 2, 2024Updated 2 years ago
- A Python based ECDSA secp256k1 private key recovery tool☆33Mar 18, 2024Updated last year
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- rnn/lstm to generate private keys from public keys of known high value☆39Jan 7, 2022Updated 4 years ago
- ☆16Apr 20, 2024Updated last year
- ☆19Jun 7, 2021Updated 4 years ago
- Small, fast, header only, zero dependency cryptographic library.☆25Aug 3, 2023Updated 2 years ago
- ☆24Jan 21, 2022Updated 4 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Feb 20, 2020Updated 6 years ago
- Bitcoin and Zcash wallets made simple - Javascript implementation of BIP 32 Bitcoin hierarchical deterministic keys☆23Jun 5, 2019Updated 6 years ago
- Generating private keys from passphrases, checking transactions and ballances. Sweeping bitcoins by importing private keys into blockchai…☆22Nov 29, 2014Updated 11 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks, C99☆24Oct 10, 2019Updated 6 years ago
- 基于nsjail的CTF竞赛Docker环境☆24Jul 30, 2018Updated 7 years ago
- Password Guessing for different Web Portals☆29Nov 14, 2018Updated 7 years ago
- My solutions and explanations of the http://cryptopals.com/ challenges.☆26Jul 6, 2021Updated 4 years ago
- NTPD remote DOS exploit and vulnerable container☆25Oct 30, 2017Updated 8 years ago
- 2018大学生信息安全国赛pwn出题docker☆26Jun 23, 2018Updated 7 years ago
- GitHub codespacesで体験するFIWARE学習コンテンツ☆10Sep 25, 2024Updated last year
- ☆17Jun 10, 2025Updated 8 months ago
- ☆10Nov 3, 2024Updated last year
- Bitcoin Hush☆12Apr 29, 2020Updated 5 years ago
- Firmware analysis gone wild.☆41Aug 24, 2014Updated 11 years ago
- ☆12Jan 6, 2018Updated 8 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- Cuda Miner for BeamHash (Equihash 150,5)☆13Jan 16, 2019Updated 7 years ago
- A C++ class that adds arbitrary precision integers aimed at high performance and ease of use. All you need to do is replace int with huge…☆11Mar 6, 2024Updated 2 years ago
- Brute force Bitcoin private keys.☆40Apr 5, 2021Updated 4 years ago