Pure Python hash length extension module
☆133Jan 28, 2023Updated 3 years ago
Alternatives and similar repositories for hlextend
Users that are interested in hlextend are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Security focused tool for dumping information from Active Directory via LDAP☆19Dec 2, 2024Updated last year
- ☆10Jul 16, 2025Updated 9 months ago
- ☆1,194Jan 27, 2025Updated last year
- A pure python tool to implement/exploit the hash length extension attack☆39Aug 14, 2023Updated 2 years ago
- Lazy python wrapper of KLEE for solving CTF challenges☆64Oct 31, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆69Nov 10, 2025Updated 5 months ago
- gemastik-xvi-final public repository☆16Sep 15, 2023Updated 2 years ago
- Solving linear systems over GF(2) by manipulating bitvectors☆85Feb 12, 2026Updated 2 months ago
- Hash Length Extension Attack☆30May 12, 2021Updated 4 years ago
- Create files whose CRC32 value matches that of another file☆20Jul 19, 2017Updated 8 years ago
- ☆44Sep 21, 2025Updated 7 months ago
- CTF write-ups☆217Feb 12, 2025Updated last year
- A toolkit for cryptanalysis using lattices.☆137Dec 2, 2023Updated 2 years ago
- A Sage interface for FGb (Gröbner basis computations)☆38Feb 1, 2026Updated 3 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Cracking psuedorandom stuffs.☆25Jan 14, 2026Updated 3 months ago
- Predict python's random module generated values.☆440Nov 29, 2024Updated last year
- Predict MT19937 PRNG, from preceding 624 generated numbers. There is a specialization for the "random" of Python standard library.☆198Dec 29, 2020Updated 5 years ago
- Cracking V8 Math.random() from arbitrary bit leaks☆35Mar 16, 2026Updated last month
- HITCON 2023 x DEVCORE Wargame☆22Aug 24, 2023Updated 2 years ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆125Dec 21, 2024Updated last year
- Files and writeups for challenges I authored in BalsnCTF 2022.☆26Sep 5, 2022Updated 3 years ago
- CFURL Cache inspector for Burp Suite☆18Dec 8, 2020Updated 5 years ago
- Interactive IRC bot and logger in pure Bash☆16Dec 12, 2012Updated 13 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Scripting together some of my favorite Python tools for doing initial triage of a suspected malicious document (e.g. PDF, DOC, DOCX, XSLM…☆17Mar 8, 2022Updated 4 years ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated 2 years ago
- ☆38Sep 18, 2023Updated 2 years ago
- Python implementations of cryptographic attacks and utilities.☆1,256Jan 8, 2026Updated 3 months ago
- Coppersmith's method for multivariate polynomials☆196Oct 11, 2023Updated 2 years ago
- Anything related to Ghidra☆12Apr 22, 2019Updated 7 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 8 years ago
- ctf writeups☆62Aug 21, 2022Updated 3 years ago
- ☆13Dec 6, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- All challenges from DiceCTF @ HOPE 2022☆28Jul 25, 2022Updated 3 years ago
- web form crack☆12May 10, 2016Updated 9 years ago
- A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH☆139Apr 17, 2023Updated 3 years ago
- ☆12Feb 20, 2022Updated 4 years ago
- Repo for collecting part of my public CTF challenges☆44Mar 25, 2024Updated 2 years ago
- ☆12Jan 10, 2024Updated 2 years ago
- ☆85Apr 10, 2023Updated 3 years ago