Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cryptography attack
attack
x
cryptography
x
63 search results found
Wycheproof
⭐
2,678
Project Wycheproof tests crypto libraries against known attacks.
Awesome Crypto Papers
⭐
1,518
A curated list of cryptography papers, articles, tutorials and howtos.
Terrapin Scanner
⭐
811
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Bitcracker
⭐
699
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Crypto Attacks
⭐
694
Python implementations of cryptographic attacks and utilities.
Diffie Hellman_backdoor
⭐
545
How to backdoor Diffie-Hellman
Rsa And Lll Attacks
⭐
493
attacking RSA via lattice reductions (LLL)
Bitauth
⭐
491
Authenticate with web services utilizing the same strategy as Bitcoin.
Keyshuffling
⭐
340
Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain
Airgap Vault
⭐
332
The AirGap Vault is installed on a spare smartphone that has no connection to any network, thus it is air gapped. This app handles the private key.
Whitebox Crypto Aes
⭐
291
Whitebox AES implementation in C++. Chow, Karroumi.
Ed25519 Unsafe Libs
⭐
208
List of unsafe ed25519 signature libs
Write Up
⭐
176
😼 CTF write-ups
Ctf Crypto
⭐
165
Contains tools for solving RSA and other crypto problems in CTFs.
Argon2rs
⭐
150
The pure-Rust password hashing library running on Argon2.
Padding Oracle Attacker
⭐
150
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
Crypto1_bs
⭐
148
Bitsliced Crypto-1 brute-forcer
Hs Jose
⭐
121
Haskell JOSE and JWT library
Cryptodeeptools
⭐
110
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Damnvulnerablecryptoapp
⭐
81
An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit more about crypto, without the need to dive deep into the math behind it
Tools For Cryptanalysis
⭐
79
A repository that aims to provide tools for cryptography and cryptanalysis
X Rsa
⭐
77
Cryptography Tool | RSA Attacks
Cytro
⭐
77
Tools to solve CTF crypto challenge.
Microllect
⭐
76
an introduction to the Bitcoin (BTC) network and how addresses are made,Fully automated btc wallet Attack,using advanced protocols.
Owiener
⭐
75
A Python3 implementation of the Wiener attack on RSA
Eddsa Fault Attack
⭐
49
Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Whitebox
⭐
49
White-box Analysis and Implementation Tools
Cryptanalysis
⭐
45
This is my personal (big) recopilation about cryptanalysis, crypto tools and challenges
Tsskit Threshold Signature Scheme Toolkit
⭐
40
The project is open-sourced and funded by Binance Lab.
Pypuf
⭐
36
Cryptanalysis of Physically Unclonable Functions
Cryptools
⭐
33
Useful crypto tools for CTF
Many Time Pad Attack
⭐
32
Attacking A Many Time Pad - Cryptography
Simple Cryptography
⭐
32
Scripts that illustrate basic cryptography concepts based on Coursera Standford Cryptography I course and more.
Ca Baka
⭐
30
Simple X509 Certificate Authority/Generation Script (The sysadmin's and network security developer's best friend)
Padding_oracle.py
⭐
30
Fast threaded padding oracle attack automation script for Python 3.
Md5
⭐
30
MD5 hash function
Cryptoattacks
⭐
27
Implementation of attacks on cryptosystems
Sctf2017
⭐
26
Samsung CTF 2017 Problems. https://sctf.codeground.org
Cryptosplainers
⭐
26
This is why nobody ever encrypts anything
Php Cryptopals
⭐
24
The Matasano crypto challenges completed using PHP
H2c Rust Ref
⭐
23
Hash to curves - Rust reference implementation
Samson
⭐
21
Cryptanalysis and attack library
Bleichenbacher
⭐
20
Bleichenbachers "Million message attack" on RSA in Python
Curl Collisions
⭐
20
An implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Cryptopals
⭐
18
Solutions to https://cryptopals.com problems
Protect
⭐
18
PhishFort Anti-Phishing Chrome Plugin
Fsrm Anticrypto
⭐
16
Protect servers against crypto attacks
Noble Ripemd160
⭐
15
Noble RIPEMD160. High-security, easily auditable, 0-dep, 1-file hash function
Crypto
⭐
15
Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.
Redox Ecc
⭐
13
Elliptic curves Rust reference implementation
Voracle
⭐
11
Compression Oracle Attack on OpenVPN
Security Cheat Sheet
⭐
10
Aes_padding_oracle_attack
⭐
10
Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).
Zcrypt
⭐
9
Basic decryption tool
Kirv
⭐
8
Materials for the Cryptography and computer security course
Crypot
⭐
8
Library of Crypto exploits
Nocoiner
⭐
8
A Commitment Scheme library for Coin Flipping/Tossing algorithms and sort. 🍀 🐫 🔒 🔑
Sour16
⭐
7
Toy version of the sweet32 attack
Virgil Purekit Go
⭐
7
PureKit Golang is a security framework that allows developers to protect users' passwords and sensitive personal information in a database from data breaches and both online and offline attacks and make stolen passwords useless even if a database is breached.
Moderncryptolib
⭐
7
Python cryptography library
Socracked
⭐
7
Performs key-recovery attacks on the SoDark family of algorithms.
Breaking Winning Challenges Of Whibox2019
⭐
7
Crypto A Day
⭐
6
Crash course style practical cryptography study
Pixo Cash
⭐
6
Decentralized pseudonymous scrypt cryptocurrency
Awesome Collisions
⭐
6
Collection of vulnerable functions
Arduino Nfc Sec 01
⭐
6
Arduino library that implements the NFC-SEC Cryptography Standard using ECDH and AES (more or less)
Stanford Cryptography
⭐
6
Programming assignments for Coursera Cryptography I by Stanford University
Isap Code Package
⭐
6
Code package for ISAP, a family of lightweight authenticated encryption algorithms designed with a focus on robustness against implementation attacks that is currently competing in the final round of NIST's standardization effort for lightweight authenticated encryption schemes.
Ecdlp Pollardrho Gmp
⭐
6
Pollard Rho attack on ECDLP with GMP
Legendreprf
⭐
5
Cryptanalysis of the Legendre PRF Challenges
Mrrobotqr
⭐
5
«MrRobotQR» is an open source script that automates the process from entering a search keyword to deriving the private key of a Bitcoin wallet.
Virgil Purekit Php
⭐
5
PureKit PHP SDK allows developers to protect users' passwords and sensitive personal information in a database from data breaches and both online and offline attacks and make stolen passwords useless even if a database is breached.
Cryptoran
⭐
5
A crypto library implementing pkc, block ciphers, key exchange and signatures
Caesar Cipher Cracker
⭐
5
Crack one of the oldest Encryption Algorithms and reveal what is hidden in the ciphertext.
Ion
⭐
5
🗺️ION Digital Currency ©️ 👛
Reduce Private Key
⭐
5
Reducing the private key through scalar multiplication using the ECPy + Google Colab library
Cryptopals
⭐
5
Hacking cryptography in Ruby, using Cryptopals techniques
Related Searches
Python Attack (2,252)
Cryptography Cryptocurrency (1,658)
Encryption Cryptography (1,357)
Cryptography Bitcoin (1,044)
Python Cryptography (1,005)
Blockchain Cryptography (974)
C Cryptography (813)
Golang Cryptography (734)
Javascript Attack (693)
C Plus Plus Cryptography (677)
1-63 of 63 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.