Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.
☆24Apr 20, 2018Updated 8 years ago
Alternatives and similar repositories for CRYPTO
Users that are interested in CRYPTO are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Codespace repo for ECON 235 & LB 235☆27Jan 30, 2025Updated last year
- Modulo's Open Distributed SCAP Infrastructure Collector, or modSIC, makes it easier for security analysts to scan an environment vulnerab…☆15Jun 23, 2017Updated 8 years ago
- kangaroo_address/ bitcrack_keyhunt_☆19Aug 12, 2023Updated 2 years ago
- Tools for btc hacking☆15Feb 21, 2021Updated 5 years ago
- Bitcoin private key brute force written in Python☆11Aug 22, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A Sage implementation of the ROCA attack☆29May 16, 2023Updated 3 years ago
- Experimental PowerShell tools for Penetration Testing / Red Teaming☆22Jun 28, 2017Updated 8 years ago
- Automated Phishing Tool☆11May 27, 2020Updated 5 years ago
- ☆12Jan 6, 2018Updated 8 years ago
- CryptoKeyHunter is a Python script that generates an unlimited number of Bitcoin addresses and keys, checks them against a list of target…☆12Oct 8, 2024Updated last year
- Forge PKCS1v1.5 signature for questionable implementation of verification algorithms...☆10Jun 26, 2024Updated last year
- An ARM disassembler written in Python that also generates pseudo-code☆16Jan 6, 2017Updated 9 years ago
- deepracer-for-codespaces is a starter repository from AI Castle School that lets you train AWS DeepRacer models right inside GitHub Codes…☆23Apr 26, 2025Updated last year
- Amoeba: Binary Code Diverisfication through Composite Software Diversification☆10Aug 3, 2017Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- Изучение C++ и алгоритмов CV на спец. курсе для 11 классов ФМЛ №239☆10Sep 5, 2024Updated last year
- Code from the book "FreeBSD Device Drivers: A Guide for the Intrepid"☆12Oct 10, 2016Updated 9 years ago
- Bloom filter alternative (C++)☆18Nov 8, 2018Updated 7 years ago
- Shell scripts for decompiling and analyzing binary files through the retdec.com REST API.☆12Jun 17, 2018Updated 7 years ago
- Brute force Bitcoin Public keys for puzzles.☆12Dec 24, 2021Updated 4 years ago
- PoC implementation of Gallois Field, Paillier, DSA, ECDSA, and curve secp256k1 with an adapted scheme of "Two-party generation of DSA si…☆13Feb 5, 2018Updated 8 years ago
- POSTECH: Heterogeneous Parallel Computing (Fall 2023)☆19Dec 9, 2023Updated 2 years ago
- Ghidra consonance and make it more ida-ish☆16Mar 11, 2019Updated 7 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- My solutions and explanations of the http://cryptopals.com/ challenges.☆26Jul 6, 2021Updated 4 years ago
- Library to show secp256k1 curve's mirror called "secq"☆14Aug 6, 2018Updated 7 years ago
- Maciej Sypien personal dotfiles for macOS, Linux (ubuntu)☆11Apr 13, 2026Updated last month
- ☆21Jul 31, 2019Updated 6 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- Set of usefull (or not) scripts used for reverse engineering Diablo 2 v1.14d game using Ghidra☆10Jan 26, 2022Updated 4 years ago
- Implementation of the Pollard's Rho Lambda Algorithm for the secp256k1 curve.☆20Apr 19, 2026Updated last month
- KeyQuest is a high-performance, CPU-based Bitcoin private-key search tool that leverages AVX2/512 and OpenMP to scan a specified hex rang…☆13Jun 14, 2025Updated 11 months ago
- A tool to create multisig addresses and transactions☆20Jun 9, 2017Updated 8 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A tool for cracking Bitcoin private keys☆11Feb 3, 2022Updated 4 years ago
- Crackhash is a tool that try to crack different types of hashes using free online services.☆25Oct 29, 2019Updated 6 years ago
- Bitcoin Private Key Extractor☆37Oct 13, 2016Updated 9 years ago
- Pure Python implementation of an elliptic curve cryptosystem based on FIPS 186-3. WARNING: This Project is de-facto unmaintained since 20…☆20Nov 20, 2015Updated 10 years ago
- _Working_ examples from Grayhat Python☆14Apr 28, 2015Updated 11 years ago
- PyMal is a python based interactive Malware Analysis Framework. It is built on the top of three pure python programes Pefile, Pydbg and V…☆44Jul 10, 2016Updated 9 years ago
- Find all solutions to SUBSET-SUM, including negative, positive, and repeating numbers☆17Jan 24, 2024Updated 2 years ago