Ruby script for cracking ECDSA private key
☆10Mar 25, 2017Updated 8 years ago
Alternatives and similar repositories for ecdsa-breaker
Users that are interested in ecdsa-breaker are comparing it to the libraries listed below
Sorting:
- DUST ATTACK blockchain transaction with confirmation of isomorphism for a total amount of 10000 BTC☆11Feb 4, 2026Updated 3 weeks ago
- In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …☆15Jan 22, 2023Updated 3 years ago
- Implement Frey-Rück Attack to get the secret key “K” (NONCE) / Critical vulnerability in the Bitcoin☆13Dec 7, 2022Updated 3 years ago
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Dec 7, 2022Updated 3 years ago
- A Java object-oriented (OOP) console application, which will take a user's account ID and corresponding secure 4-digit Pin number (stored…☆11May 22, 2020Updated 5 years ago
- ChatGPT-Executor is a server application that empowers ChatGPT to execute Windows commands, unlocking a wide range of applications and ca…☆15Jun 30, 2023Updated 2 years ago
- A collection of theoretical research and analysis of cryptography-based game outcomes in the pursuit of a breakthrough discovery.☆17Oct 29, 2024Updated last year
- Este projeto é fruto de um estudo pessoal sobre o algoritmo Secp256k1. O objetivo dele é conseguir obter, usando apenas os valores da cha…☆12Dec 7, 2022Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- ChatGPT_DARE: An AI-Powered GPT-4 Chatbot with Unrestricted Capabilities☆11Apr 4, 2023Updated 2 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range☆36Dec 7, 2022Updated 3 years ago
- Elliptic curve tools, ECDSA, and ECDSA attacks.☆41Aug 14, 2024Updated last year
- ☆16Dec 9, 2015Updated 10 years ago
- Uses Go net/http library to distinguish alive hosts from a give list of hosts/urls☆12Dec 23, 2019Updated 6 years ago
- Lamoreaux Lab Srp Energy Developer APIs - Python☆11Mar 29, 2024Updated last year
- Bitcoin Wallet Recovery via ECDSA Short Signatures☆11Dec 7, 2022Updated 3 years ago
- A Go Wrapper for JQ☆12Nov 1, 2019Updated 6 years ago
- Java-based open-source and versatile simulation platform for education and research-driven experiments in evolutionary robotics (ER)☆12Jun 2, 2023Updated 2 years ago
- Extracting card number and then displaying user account details along with online payments features. Displaying nearby Bank/ATMS using ge…☆12May 16, 2021Updated 4 years ago
- Dotfiles for Neovim, zsh, tmux, ...☆10Jan 16, 2026Updated last month
- Get newest public disclosed HackerOne report notifications on your Desktop☆14Jan 29, 2020Updated 6 years ago
- Creates a new list and adds all accounts you are following to that list, then unfollows them all☆12Dec 15, 2019Updated 6 years ago
- Exploit for CVE-2023-38571☆13Sep 27, 2023Updated 2 years ago
- Unlock the full potential of large language models in dotnet with DotnetPrompt☆14Jun 21, 2024Updated last year
- Python library to interface with alarm.com accounts.☆10Mar 18, 2020Updated 5 years ago
- Search for private keys to receive Bitcoins using own algorithm "Bloom filter".☆35Mar 20, 2025Updated 11 months ago
- Skeleton project for your own GRUB-based bootkit☆17Jan 11, 2020Updated 6 years ago
- Browse Android ROMs☆12Dec 5, 2018Updated 7 years ago
- Bootstrap a Google App Engine project with Django and other goodies.☆33Sep 30, 2013Updated 12 years ago
- Create Kali Linux VM with i3 using Vagrant and Ansible☆16Feb 18, 2020Updated 6 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Dumps the private keys from a wallet.dat file.☆12Oct 11, 2019Updated 6 years ago
- my dotfiles☆13Jan 30, 2026Updated last month
- ☆16Apr 24, 2024Updated last year
- convtags is a bidirectional converter beetween DokuWiki and AsciiDoc formatted text files.☆12May 3, 2019Updated 6 years ago
- Explained in few steps what should one do in order to be able to inspect mobile (iOS and Android) app☆12Jul 12, 2017Updated 8 years ago
- This is an example app which shows how to use Sign In With Twitter with Google App Engine☆16Oct 6, 2013Updated 12 years ago
- Claimbits Faucet Script FREE☆14Feb 9, 2023Updated 3 years ago