Recover the private key from signed DSA messages. (multiple signed messages, static coefficient 'k')
☆39Apr 7, 2018Updated 7 years ago
Alternatives and similar repositories for DSAregenK
Users that are interested in DSAregenK are comparing it to the libraries listed below
Sorting:
- A simple library to recover the private key of ECDSA and DSA signatures sharing the same nonce k and therefore having identical signature…☆421Feb 16, 2022Updated 4 years ago
- ☆10Oct 2, 2021Updated 4 years ago
- Convex optimization for fun and profit.☆11Jan 12, 2022Updated 4 years ago
- Brute force bitcoin wallets☆10Dec 8, 2022Updated 3 years ago
- Implementation of the parallel Pollard's rho method for solving the Elliptic Curve Discrete Logarithm Problem (ECDLP).☆11Mar 14, 2015Updated 10 years ago
- Highly experimental fault-proof program for Optimism Bedrock☆20Mar 27, 2023Updated 2 years ago
- BruteForceBlocker is a perl script, that works along with pf firewall. Its main purpose is to block SSH bruteforce attacks via firewall.☆21Feb 17, 2021Updated 5 years ago
- Bitcoin wallet cracker☆13Sep 21, 2022Updated 3 years ago
- Bitcoin Cracked Private Key with hdwallet☆17Aug 19, 2022Updated 3 years ago
- ☆20Jul 13, 2023Updated 2 years ago
- 基于Python的开源量化交易平台开发框架☆21Sep 6, 2021Updated 4 years ago
- The source code of main tools used in Bitcoin "non-malware-based" attacks.☆554Jun 8, 2024Updated last year
- Proof-of-concept implementation of the Apple relay attack in Python☆30Aug 27, 2014Updated 11 years ago
- A Shadow plug-in that runs the Bitcoin Satoshi reference software☆25Feb 20, 2020Updated 6 years ago
- Tools for computing Elliptic Curve interval discrete logarithms using Pollard's lambda algorithm☆25Jul 29, 2020Updated 5 years ago
- A collection of tools and scripting for helping prepare and perform the task of claiming fork and airdrop value from Bitcoin keys☆23Mar 14, 2022Updated 3 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆29Apr 29, 2016Updated 9 years ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Small collection of tools written in C for ECC and bitcoin☆74Jun 28, 2024Updated last year
- Algorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.☆110Oct 19, 2020Updated 5 years ago
- Related address generator.☆30May 1, 2015Updated 10 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 6 months ago
- ☆13Aug 28, 2025Updated 6 months ago
- Akira Bot adalah Bot Whatsapp yg Memiliki 500+ Fitur, dan Menggunakan Bermacam² Rest Api☆10Apr 6, 2021Updated 4 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- My personal profile!☆17Oct 25, 2024Updated last year
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 4 years ago
- ☆13Mar 9, 2017Updated 9 years ago
- My Blog - https://0xresetti.github.io☆11Mar 1, 2026Updated last week
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- Pure python parser for Snort/Suricata rules.☆34Mar 13, 2024Updated last year
- ☆13Dec 25, 2025Updated 2 months ago
- A stupid haystack search for bruteforcing bitcoin privatekeys!☆27Jul 22, 2024Updated last year
- 😵💫 A Recurrent Neural Network (RNN) hallucinating solidity source code.☆42Nov 12, 2021Updated 4 years ago
- Tool for computing elliptic curve (EC) discrete logarithms☆37Jul 8, 2017Updated 8 years ago
- 比特币/以太坊 钱包碰撞器☆82Jun 27, 2024Updated last year
- Demonstration of a critical vulnerability in WhatsApp that allows automatic execution of malicious .pyz (Python) files, leading to a reve…☆18Jul 31, 2024Updated last year