Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.
☆24Apr 20, 2018Updated 7 years ago
Alternatives and similar repositories for CRYPTO
Users that are interested in CRYPTO are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- kangaroo_address/ bitcrack_keyhunt_☆19Aug 12, 2023Updated 2 years ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- Ethereum DEVnet - one node, automatic address generation, genesis block setup + mining script ~160MB☆12Mar 6, 2021Updated 5 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Jun 28, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- ☆12Jan 6, 2018Updated 8 years ago
- Useful crypto tools for CTF☆40Jul 2, 2022Updated 3 years ago
- CryptoKeyHunter is a Python script that generates an unlimited number of Bitcoin addresses and keys, checks them against a list of target…☆11Oct 8, 2024Updated last year
- A Python based ECDSA secp256k1 private key recovery tool☆33Mar 18, 2024Updated 2 years ago
- Multiplying... backward?☆14Jul 22, 2020Updated 5 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆43Oct 10, 2023Updated 2 years ago
- 32btc bounty address search on GPU☆19Jan 2, 2024Updated 2 years ago
- 2018大学生信息安全国赛pwn出题docker☆26Jun 23, 2018Updated 7 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A powerful solution for tackling the Elliptic Curve Discrete Logarithm Problem (ECDLP) within the context of secp256k1.☆11Dec 13, 2025Updated 4 months ago
- Solve discrete logarithm problems by the number field sieve method.☆19Aug 30, 2017Updated 8 years ago
- ☆24Jan 21, 2022Updated 4 years ago
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- An ARM disassembler written in Python that also generates pseudo-code☆16Jan 6, 2017Updated 9 years ago
- ☆13Jan 19, 2024Updated 2 years ago
- Generate random test credit card numbers for testing, validation and/or verification purposes.☆12Nov 28, 2021Updated 4 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated 11 months ago
- C++ STL for speed and cryptanalytic application☆11Dec 16, 2025Updated 4 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Project HMS☆10Jun 11, 2018Updated 7 years ago
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- A small and easy to use HPKE implementation in Go.☆20Dec 12, 2024Updated last year
- Bloom filter alternative (C++)☆18Nov 8, 2018Updated 7 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- AM radio data exfiltration with CPU cache in assembly☆20Dec 7, 2023Updated 2 years ago
- rnn/lstm to generate private keys from public keys of known high value☆38Jan 7, 2022Updated 4 years ago
- x64dbg Script editor v2.0☆27Oct 26, 2017Updated 8 years ago
- A stacked docker environment for solving CTF PWN challenges.☆10Dec 4, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Shell scripts for decompiling and analyzing binary files through the retdec.com REST API.☆12Jun 17, 2018Updated 7 years ago
- A beginner's guide to computer programming (2006)☆12Aug 10, 2018Updated 7 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Feb 5, 2018Updated 8 years ago
- Golang Post Quantum Secure Wire☆19Jul 31, 2025Updated 8 months ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆19Dec 9, 2023Updated 2 years ago
- PoC exploit for late August 2018 Task Scheduler ALPC Vulnerability☆24Oct 10, 2019Updated 6 years ago
- A Rust implementation of CPace, a balanced PAKE.☆26Dec 15, 2023Updated 2 years ago