Code for the paper "AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models"
☆30Sep 27, 2025Updated 7 months ago
Alternatives and similar repositories for aicrypto-agent
Users that are interested in aicrypto-agent are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Representing DES in Z3☆16Jul 14, 2023Updated 2 years ago
- Attacking ECDSA with nonce leakage using lattice-based algorithms☆44Nov 19, 2025Updated 5 months ago
- ☆69Nov 10, 2025Updated 5 months ago
- ☆24Mar 4, 2025Updated last year
- Fast lattice reduction using segmentation, multithreading, Seysen reduction and BLAS☆52Mar 18, 2026Updated last month
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆38Sep 18, 2023Updated 2 years ago
- Solve discrete logarithm problems by the index calculus method.☆16Aug 30, 2017Updated 8 years ago
- Wouter Castryck, Thomas Decru. "An efficient key recovery attack on SIDH" の実装☆11Aug 12, 2023Updated 2 years ago
- Revisiting Differential-Linear Attacks via a Boomerang Perspective☆11Nov 26, 2025Updated 5 months ago
- Coppersmith method (solving polynomial equation over composite modulus on small bounds)☆125Dec 21, 2024Updated last year
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 12 years ago
- This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications.☆51Jan 19, 2026Updated 3 months ago
- ☆22Sep 2, 2025Updated 8 months ago
- PEDA - Python Exploit Development Assistance for GDB☆13Jul 13, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- HITCON 2025 x DEVCORE Wargame☆15Sep 8, 2025Updated 8 months ago
- ☆16May 17, 2024Updated last year
- My CTF Challenge☆12Feb 5, 2026Updated 3 months ago
- Solution of some challenges on Cryptohack☆15Jan 6, 2024Updated 2 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆19Feb 22, 2017Updated 9 years ago
- In-the-wild deepfake detection dataset☆14Mar 5, 2025Updated last year
- Automated discovery and exploitation of security vulnerabilities using natural language and LLMs.☆21Feb 27, 2026Updated 2 months ago
- Delta Development Documentation☆24Jun 8, 2023Updated 2 years ago
- ☆10Jul 16, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Implementation of some information-set decoding algorithms☆10Jul 21, 2021Updated 4 years ago
- CTF Writeups Backup☆13Nov 4, 2024Updated last year
- ☆15Mar 14, 2023Updated 3 years ago
- Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs☆99Apr 20, 2021Updated 5 years ago
- "VMBreaker" is a specialized tool for virtual machine security testing, offering essential, user-friendly features for efficient penetrat…☆14Apr 15, 2024Updated 2 years ago
- Repo for collecting part of my public CTF challenges☆44Mar 25, 2024Updated 2 years ago
- ☆34Mar 12, 2025Updated last year
- 爛清大,給我電☆20Oct 18, 2023Updated 2 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆20Dec 11, 2025Updated 4 months ago
- ☆16Apr 17, 2025Updated last year
- FIPS-204 (ML-DSA) implementation in Go☆20Feb 13, 2026Updated 2 months ago
- Challenge archive☆26Apr 23, 2026Updated 2 weeks ago
- ☆12Jun 5, 2025Updated 11 months ago
- The project serves as a strategic advisory tool, capitalizing on the ZySec series of AI models to amplify the capabilities of security pr…☆69May 19, 2024Updated last year
- Real-time command injection monitor with syntax highlighting and balance analysis.☆23Sep 24, 2025Updated 7 months ago