stephenbradshaw / hlextend
Pure Python hash length extension module
☆123Updated 2 years ago
Alternatives and similar repositories for hlextend:
Users that are interested in hlextend are comparing it to the libraries listed below
- Coppersmith's method for multivariate polynomials☆159Updated last year
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆127Updated 11 months ago
- ☆66Updated 4 years ago
- Implementation of attacks on cryptosystems☆70Updated 3 years ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆319Updated 2 years ago
- Small python module for common CTF crypto functions☆166Updated 2 years ago
- CVP "trick" for CTF challenges☆130Updated last year
- A repository trying to collect things related to LLL☆71Updated 5 months ago
- Working with numbers (primes, modular, etc.)☆241Updated 2 years ago
- Complex multiplication based factorization☆36Updated 3 years ago
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆173Updated 4 years ago
- Cryptography & CTF Writeups☆82Updated 2 years ago
- A Python3 implementation of the Wiener attack on RSA☆118Updated 9 months ago
- ☆94Updated 3 years ago
- TCP flow analyzer with sugar for A/D CTF☆138Updated 2 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆73Updated 3 years ago
- CTF write-ups☆82Updated 3 months ago
- A CTF platform used in IceCTF 2016☆68Updated 4 years ago
- Hosting awesome cryptography CTF challenges from past CTFs☆106Updated last month
- ☆27Updated 2 years ago
- Challenges I created for CTF competitions.☆195Updated 3 weeks ago
- Writeups to Crypto Challenges in CTFs☆42Updated 6 years ago
- RSHack - Tool for RSA CTF's challenges☆94Updated 6 years ago
- CTF challenges from redpwnCTF 2020☆59Updated 4 years ago
- Implements Coron's simplification of Coppersmith's algorithm☆42Updated last year
- ☆61Updated 4 years ago
- rkm0959 implements stuff☆43Updated 2 years ago
- Fix stack addresses (when no ASLR) with and without debugging☆180Updated 10 years ago
- Docker image for attacking cryptography CTF challenges☆97Updated 10 months ago
- ☆160Updated 2 years ago