Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for cryptanalysis
cryptanalysis
x
44 search results found
Crypton
⭐
1,417
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Xortool
⭐
1,229
A tool to analyze multi-byte xor cipher
Featherduster
⭐
928
An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction
Discohash
⭐
217
🚀 DISCoHAsH - Simple, fast, quality hash in 120 lines. 10GB/s serial (depending on hardware). Also in NodeJS
Mtp
⭐
114
Many-Time Pad Interactive
Castryck Decru Sagemath
⭐
84
A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH
Tools For Cryptanalysis
⭐
79
A repository that aims to provide tools for cryptography and cryptanalysis
Cryptool 2
⭐
78
Official CrypTool 2 git repository
Coinwatch
⭐
58
Coinmarketcap console client to keep track of your crypto currency trades - are you winning or losing?
Rain
⭐
30
Rain Hashes: Rainbow, Rainstorm and more! Support our work with a ⭐ 🥰
My Public Ctf Challenges
⭐
29
Repo for collecting part of my public CTF challenges
Sboxgates
⭐
27
Program for finding low gate count implementations of S-boxes.
Cascada
⭐
26
A tool to evaluate the security of cryptographic primitives against distinguishing attacks with bit-vector SMT solvers.
Enigmacode
⭐
25
Cracking the Enigma Code
Arxpy
⭐
25
Tool to find XOR differential and rotational-XOR characteristics of ARX primitives.
Sparkle
⭐
23
Sparkle, Schwaemm and Esch: Lightweight Symmetric Cryptography for the Internet of Things
Samson
⭐
21
Cryptanalysis and attack library
Cry
⭐
21
SageMath/Python Toolkit for Cryptanalytic Research
Curl Collisions
⭐
20
An implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Keybrute
⭐
19
A wordlist-based encryption key brute forcer targeting weak key choice/derivation
Hitag2hell
⭐
18
Brutally optimizing guess-and-determine attacks https://www.usenix.org/conference/woot18/presentat
Crypto Watchdog
⭐
17
Crypto Watchdog is an open-source developer friendly project, periodically queries crypto market and notifies potential pumps & recently added tokens/coins via web-hooks.
Px1000cr
⭐
13
Files related to PoC||GTFO 21:21 - NSA’s Backdoor of the PX1000-Cr
Ultra
⭐
12
Cryptanalysis of the Enigma machine in Rust.
Thesis
⭐
12
Design and Cryptanalysis of Symmetric-Key Algorithms in Black and White-box Models
Lantern
⭐
11
Cryptanalysis library for breaking classical ciphers
Autoguess
⭐
10
An easy-to-use, general and open-source tool to search for guess-and-determine attacks and key bridges
Auto Cryptanalysis
⭐
9
Automated cryptanalysis of substitution permutation network cipher
Memories
⭐
8
A key-recovery attack for LINE for Android's chat backup encryption.
Cryptopals
⭐
8
🔐 My answers to challenges in https://cryptopals.com
Aes256m Cracker
⭐
8
🔐🔨 PoC of cracking a training version of AES-256 (AES-256-M)
Enigmator
⭐
7
Web-based Cryptography Tools
Pycryptotools
⭐
7
A set of Python tools useful for cryptography and cryptanalysis.
Socracked
⭐
7
Performs key-recovery attacks on the SoDark family of algorithms.
Torch
⭐
7
Command-line Cryptanalysis
Vigcrack
⭐
6
A simple cryptanalysis tool for the Vigenere cipher.
Aes Ctr Padding Attack
⭐
6
Golang programs for AES-CTR mode encryption with 2 different hashing algorithm and Padding Oracle attack on AES-CTR mode.
Zero
⭐
5
An Automatic Tool to Search for Full Impossible-Differential, Zero-Correlation and Integral Attacks
Blasto
⭐
5
A Python implementation of Hill-Climbing for cracking classic ciphers
Remote Timing Attacks Are Practical
⭐
5
An attempt to replicate the attack in Brumley and Boneh's "Remote Timing Attacks are Practical" paper. I did not succeed.
Legendreprf
⭐
5
Cryptanalysis of the Legendre PRF Challenges
Lagrange
⭐
5
Cryptanalysis on differents algorithms with z3 solver sat
Brute Force Attacker Php
⭐
5
Brute-force attack tool for generating all possible string and executing function
Decryptosuite
⭐
5
A python based toolkit for performing cryptographic operations.
1-44 of 44 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.