thecrabsterchief / hash-length-extension
A pure python tool to implement/exploit the hash length extension attack
☆30Updated last year
Alternatives and similar repositories for hash-length-extension:
Users that are interested in hash-length-extension are comparing it to the libraries listed below
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆102Updated 3 months ago
- ☆45Updated last week
- Python's library written in Rust to quickly factor `n = pq` when around >50% bits of `p` and `q` are known which are distributed at rando…☆19Updated 3 years ago
- Functions for solving linear inequalities in integers☆45Updated last month
- A toolkit for cryptanalysis using lattices.☆119Updated last year
- Solving linear systems over GF(2) by manipulating bitvectors☆34Updated last week
- Challenges I created for CTF competitions.☆198Updated 3 weeks ago
- ☆38Updated 3 weeks ago
- Some writeups for some CTFs☆17Updated 11 months ago
- Cheatsheet useful for solving Python-related challenges during CTFs.☆67Updated last month
- Python sandbox escape wiki + payload generator☆73Updated 6 months ago
- ☆27Updated 7 months ago
- Coppersmith's method for multivariate polynomials☆160Updated last year
- ☆11Updated 3 weeks ago
- ☆21Updated 3 weeks ago
- An archive of past challenges from LA CTF hosted by ACM Cyber at UCLA and Psi Beta Rho.☆134Updated last month
- ☆36Updated last year
- Repo for collecting part of my public CTF challenges☆40Updated last year
- ☆30Updated last year
- CVP "trick" for CTF challenges☆130Updated last year
- Files + Writeups for DownUnderCTF 2023 Challenges☆170Updated last year
- Cracking V8 Math.random() from arbitrary bit leaks☆15Updated last year
- Hosting awesome cryptography CTF challenges from past CTFs☆108Updated 2 months ago
- Source code of the challenges developed for the 2024 edition of openECSC☆66Updated 5 months ago
- Firegex, a firewall for Attack-Defence CTFs by Pwnzer0tt1☆50Updated this week
- Attack & Defense CTF Farm based on DestructiveFarm☆86Updated 4 months ago
- A GDB+GEF-style debugger for unloading Python pickles☆63Updated 2 months ago
- Repository containing implementation of attacks on modern public key cryptosystems and symmetric key ciphers.☆128Updated last year
- Challenge source code and author write-ups for KalmarCTF☆66Updated last week
- Automated cryptanalysis of substitution permutation network cipher☆29Updated 7 months ago