thecrabsterchief / hash-length-extensionLinks
A pure python tool to implement/exploit the hash length extension attack
☆33Updated last year
Alternatives and similar repositories for hash-length-extension
Users that are interested in hash-length-extension are comparing it to the libraries listed below
Sorting:
- Functions for solving linear inequalities in integers☆49Updated 2 months ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆104Updated 6 months ago
- ☆47Updated last month
- Python sandbox escape wiki + payload generator☆89Updated 9 months ago
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Updated 3 years ago
- Solving linear systems over GF(2) by manipulating bitvectors☆43Updated 2 months ago
- ☆65Updated 2 months ago
- A toolkit for cryptanalysis using lattices.☆124Updated last year
- Challenges I created for CTF competitions.☆204Updated 2 months ago
- Repo for collecting part of my public CTF challenges☆41Updated last year
- Some writeups for some CTFs☆17Updated last year
- Challenge source code and author write-ups for KalmarCTF☆65Updated 3 months ago
- ☆21Updated 3 months ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆86Updated 4 years ago
- Coppersmith's method for multivariate polynomials☆166Updated last year
- Cryptography & CTF Writeups☆83Updated 2 years ago
- Files + Writeups for DownUnderCTF 2023 Challenges☆170Updated last year
- ☆11Updated last month
- Hosting awesome cryptography CTF challenges from past CTFs☆117Updated last week
- ☆26Updated 10 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆74Updated last month
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆138Updated 4 months ago
- Source code of the challenges developed for the 2024 edition of openECSC☆72Updated 8 months ago
- CVP "trick" for CTF challenges☆135Updated 2 years ago
- Automated cryptanalysis of substitution permutation network cipher☆31Updated 9 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆134Updated last year
- ☆33Updated last year
- Source code and documentation for TeamItaly CTF 2022 challenges☆41Updated 2 years ago
- A GDB+GEF-style debugger for unloading Python pickles☆67Updated 5 months ago
- SMT based attacks on non cryptographic PRNGs☆81Updated 2 years ago