All Projects → mvrc42 → Bitp0wn

mvrc42 / Bitp0wn

Algorithms to re-compute a private key, to fake signatures and some other funny things with Bitcoin.

Programming Languages

python
139335 projects - #7 most used programming language
hack
652 projects

Projects that are alternatives of or similar to Bitp0wn

Avax
AVAX is a small, modern and fast console application for decrypting passwords with certain options.
Stars: ✭ 19 (-67.8%)
Mutual labels:  algorithm, bruteforce, brute-force
Plutus
An automated bitcoin wallet collider that brute forces random wallet addresses
Stars: ✭ 404 (+584.75%)
Mutual labels:  bitcoin, bruteforce, brute-force
Hackphiles
BruteForce Tool For both Instagram and Facebook
Stars: ✭ 57 (-3.39%)
Mutual labels:  bruteforce, brute-force
Crypto Trader
💰 Cryptocurrency trading bot library with a simple example strategy (trading via Gemini).
Stars: ✭ 554 (+838.98%)
Mutual labels:  bitcoin, algorithm
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+12181.36%)
Mutual labels:  bruteforce, brute-force
Poc
Proofs-of-concept
Stars: ✭ 467 (+691.53%)
Mutual labels:  vulnerability, poc
Vulscan
vulscan 扫描系统:最新的poc&exp漏洞扫描,redis未授权、敏感文件、java反序列化、tomcat命令执行及各种未授权扫描等...
Stars: ✭ 486 (+723.73%)
Mutual labels:  vulnerability, poc
Blazy
Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .
Stars: ✭ 637 (+979.66%)
Mutual labels:  bruteforce, brute-force
Ladongo
Ladon Pentest Scanner framework 全平台LadonGo开源内网渗透扫描器框架,使用它可轻松一键批量探测C段、B段、A段存活主机、高危漏洞检测MS17010、SmbGhost,远程执行SSH/Winrm,密码爆破SMB/SSH/FTP/Mysql/Mssql/Oracle/Winrm/HttpBasic/Redis,端口扫描服务识别PortScan指纹识别/HttpBanner/HttpTitle/TcpBanner/Weblogic/Oxid多网卡主机,端口扫描服务识别PortScan。
Stars: ✭ 366 (+520.34%)
Mutual labels:  poc, brute-force
Ssb
Secure Shell Bruteforcer — A faster & simpler way to bruteforce SSH server
Stars: ✭ 832 (+1310.17%)
Mutual labels:  bruteforce, brute-force
Cve 2020 10199 cve 2020 10204
CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.
Stars: ✭ 20 (-66.1%)
Mutual labels:  vulnerability, poc
Ysoserial
A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.
Stars: ✭ 4,808 (+8049.15%)
Mutual labels:  vulnerability, poc
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+600%)
Mutual labels:  vulnerability, poc
Thc Hydra
hydra
Stars: ✭ 5,645 (+9467.8%)
Mutual labels:  bruteforce, brute-force
Poccollect
Poc Collected for study and develop
Stars: ✭ 15 (-74.58%)
Mutual labels:  vulnerability, poc
Xray
一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
Stars: ✭ 6,218 (+10438.98%)
Mutual labels:  vulnerability, poc
K8tools
K8工具合集(内网渗透/提权工具/远程溢出/漏洞利用/扫描工具/密码破解/免杀工具/Exploit/APT/0day/Shellcode/Payload/priviledge/BypassUAC/OverFlow/WebShell/PenTest) Web GetShell Exploit(Struts2/Zimbra/Weblogic/Tomcat/Apache/Jboss/DotNetNuke/zabbix)
Stars: ✭ 4,173 (+6972.88%)
Mutual labels:  poc, brute-force
Jwt Cracker
Simple HS256 JWT token brute force cracker
Stars: ✭ 365 (+518.64%)
Mutual labels:  bruteforce, brute-force
Bruteforce Database
Bruteforce database
Stars: ✭ 806 (+1266.1%)
Mutual labels:  bruteforce, brute-force
Secp256k1 Go
Bindings to lib-secp256k1 for golang
Stars: ✭ 22 (-62.71%)
Mutual labels:  bitcoin, ecdsa

Bitp0wn

This repo is a showcase of algorithms to get some fun with bitcoin cryptography.
The scripts are not optimised and are only proof-of-concepts (not suited for production).

keys

  • keys/brute_force.py : You will find a simple bruteforce algorithm wich test every possibilities to retrieve a private key from the public key.

  • keys/bsgs.py : The Baby-step Giant-step algorithm, it has order of 2^(n/2) time complexity and space complexity.

  • keys/pollard_rho.py : The Pollard Rho algorithm, it has order of 2^(n/2) time complexity but is slower than bsgs in practice. However, this algorithm has a constant space complexity.

miscellaneous

  • miscellaneous/double.py : This file is more about finding an arithmetic relationship between 2 public keys on the curve. Most of formulaes are specific to secp256k1.

  • miscellaneous/playground.py : This file contains relations between values of differents signatures for an identical address.

  • miscellaneous/secret-sign.py : A proof-of-concept to build a signature for a particular public key. Only the owner of this public key will be able to assert that the signature is correct.

  • miscellaneous/shamir-shared-secret.py : Shamir Shared Secret Scheme to distribute a secret to n entities wich can be recovered with k < n shares.

  • miscellaneous/tiny-curve.py : This script let you generate your own elliptic curves (not secure, never use the curves in production). This will be useful to test some of our algorithms on smaller curves.

signatures

  • signatures/fake_sig.py : In this script, we show why hashing the message in ecdsa is important. Because without it, you can generate plenty of signatures that can be verified with the public key of your choice.

  • signatures/r_exploit_ecdsa.py : This algorithm exploit a failure in signatures generation. If the same address use the same k in 2 differents signatures (i.e same r-value), then you can recalculate the private key instantly.

  • signatures/r_exploit_schnorr.py : Same as precedent exploit but for schnorr signatures instead of ecdsa signatures.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].