theogobinet / KatsumiLinks
Cryptography project carried out at the UTT for the GS15 course in fall 2020 (A20).
☆22Updated 4 years ago
Alternatives and similar repositories for Katsumi
Users that are interested in Katsumi are comparing it to the libraries listed below
Sorting:
- One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins☆31Updated 3 years ago
- Supporting code for exploiting the RISC-V GhostWrite vulnerability☆81Updated last year
- Python implementation of Quadratic Sieve Algorithm.☆18Updated 2 years ago
- Bitcoin Miner and SHA256 written from scratch in C++☆57Updated last year
- A complete tool for creating and editing bitcoin transactions☆40Updated 3 years ago
- Miner(cpu or gpu) for bitcoin, secretly run in a period of time☆23Updated 3 years ago
- Bitcoin Randstorm Exploit - Very Fast Private Key and Address Generator☆79Updated 2 years ago
- Use Crypto Webminer JavaScript miner on various Cryptonight | CN-Lite | CN-Fast | CN-Fast2 | CN-Pico | CN-RWZ | CN-UPX2 | CN-Half | CN-He…☆229Updated last month
- Python to Brainfuck transpiler☆53Updated 9 years ago
- BoxWallet is a single binary multi-coin CLI tool, that gets your coin-of-choice wallet/node set-up fast, with just a few commands.☆25Updated 9 months ago
- csminer Monero miner from https://cryptonote.social/☆112Updated 3 years ago
- Searching Private Key(s) for given Bitcoin address(es)☆45Updated 3 years ago
- Holy C compiler. Targets LLVM.☆42Updated 3 years ago
- crypto miner written in pure python, for learning purpose, can mine Monero XMR☆23Updated last year
- RandomX OpenCL implementation☆34Updated 5 years ago
- Arduino Bitcoin Miner (plain C and AVR assembly versions, ~150 hashes/sec.)☆85Updated last year
- A simple header only SHA1 implementation in C (no dependencies)☆38Updated 11 months ago
- Pollard's kangaroo for SECPK1☆344Updated last year
- This is the meaning of life. For those of you who don't know, it's a famous "trojan" (more of an internet joke than a trojan tbh) from ba…☆16Updated this week
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆14Updated 3 years ago
- Proof-of-work scheme building upon yescrypt and scrypt☆35Updated 6 months ago
- Monero POW mining in Python☆103Updated 2 years ago
- A bundle of bash scripts to make headless crypto mining on linux a simple reality. Unfortunately only NVIDIA support for now.☆18Updated 4 years ago
- Implementation of the Pollard's Rho algorithm for the secp256k1 curve.☆15Updated this week
- Pollard’s Kangaroo find solutions to the discrete logarithm secp256k1 PRIVATE KEY + NONCES in a known range☆34Updated 3 years ago
- Pollard, kangaroo method, solving discrete logarithm problem (DLP) using pseudorandom walks☆60Updated 6 years ago
- An exploit for Faronics DeepFreeze 8.38.220.5256 that uses SEH overflow, a custom ROP chain, and a two-phase encryption bypass to achieve…☆20Updated last year
- Simple Python CryptoCurrency mining client☆214Updated 7 years ago
- Optimized Cpuminer for Sugarchain using YespowerSugar (based on Yespower 1.0.0)☆79Updated 3 years ago
- Self-spreading Java malware targeting Minecraft servers. Infected servers are capable of scanning for other vulnerable servers, encryptin…☆121Updated last year