All Projects → ValarDragon → Ctf Crypto

ValarDragon / Ctf Crypto

Licence: gpl-3.0
Contains tools for solving RSA and other crypto problems in CTFs.

Programming Languages

python
139335 projects - #7 most used programming language

Labels

Projects that are alternatives of or similar to Ctf Crypto

Putty Cac
Windows Secure Shell Client With Support For Smart Cards & Certificates
Stars: ✭ 192 (-13.12%)
Mutual labels:  rsa
Awesome Ctf Cheatsheet
CTF Cheatsheet
Stars: ✭ 204 (-7.69%)
Mutual labels:  ctf
Rsautil
.NET Core RSA algorithm using the help tool.It supports data encryption, decryption, signature and verification signature.It supports three key formats, namely: xml, pkcs1, pkcs8.It also supports key conversion for these three formats.Last also support pem formatting.
Stars: ✭ 218 (-1.36%)
Mutual labels:  rsa
Encrypt Body Spring Boot Starter
(停止维护,替代品搜索:https://github.com/search?l=Java&q=encrypt&type=Repositories )SpringBoot控制器统一的响应体加密与请求体解密的注解处理方式,支持MD5/SHA/AES/DES/RSA
Stars: ✭ 198 (-10.41%)
Mutual labels:  rsa
House Of Corrosion
A description of the "House of Corrosion" GLIBC heap exploitation technique.
Stars: ✭ 202 (-8.6%)
Mutual labels:  ctf
Bscan
an asynchronous target enumeration tool
Stars: ✭ 207 (-6.33%)
Mutual labels:  ctf
Build An Efficient Pwn Environment
How to build an efficient pwn development environment in 2020
Stars: ✭ 191 (-13.57%)
Mutual labels:  ctf
N1ctf 2018
Official repository containing files related to N1CTF 2018.
Stars: ✭ 220 (-0.45%)
Mutual labels:  ctf
Picoctf
The platform used to run picoCTF. A great framework to host any CTF.
Stars: ✭ 203 (-8.14%)
Mutual labels:  ctf
Ctf All In One
CTF竞赛权威指南
Stars: ✭ 2,807 (+1170.14%)
Mutual labels:  ctf
Hackthevote
Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote CTFs
Stars: ✭ 198 (-10.41%)
Mutual labels:  ctf
How To Play Ctf
CTF入門建議
Stars: ✭ 201 (-9.05%)
Mutual labels:  ctf
Berserker
A list of useful payloads for Web Application Security and Pentest/CTF
Stars: ✭ 212 (-4.07%)
Mutual labels:  ctf
Basecrack
Decode All Bases - Base Scheme Decoder
Stars: ✭ 196 (-11.31%)
Mutual labels:  ctf
Relion
Image-processing software for cryo-electron microscopy
Stars: ✭ 219 (-0.9%)
Mutual labels:  ctf
Dcipher Cli
🔓Crack hashes using online rainbow & lookup table attack services, right from your terminal.
Stars: ✭ 193 (-12.67%)
Mutual labels:  ctf
Auth Jwt
A demo to learn JWT by reverse engineering
Stars: ✭ 208 (-5.88%)
Mutual labels:  rsa
Mipt Ctf
A small course on CTF (wargames) for beginners [in Russian]
Stars: ✭ 221 (+0%)
Mutual labels:  ctf
Shiva
An Ansible playbook to provision a host for penetration testing and CTF challenges
Stars: ✭ 220 (-0.45%)
Mutual labels:  ctf
Ctfnote
CTFNote is a collaborative tool aiming to help CTF teams to organise their work.
Stars: ✭ 213 (-3.62%)
Mutual labels:  ctf

CTF Crypto

This contains the code I use to perform various Cryptography Attacks in CTFs. This only contains attacks on common cryptography systems, not custom cryptosystems / hashing functions made by the CTF creators. If you have any suggestions for attacks to implement, raise a github issue.

The RSA tool is designed for python3, though it likely can be modified for python2 by removing timeouts. The files with Sage in the name are designed for sage. the .sage extension is the human readable version, the Sage.py version is the preparsed version which you can import into sage. Please note this project is not abandoned. I am currently helping create a CTF, so there are certain things I can't commit to this repository until after the CTF is complete.

RSA Tool

Note that this is Linux only, due to my usage of "signal" for timeouts.

Factorization Methods contained:

  • Check FactorDB
  • GCD for Multiple keys
  • Sieved Fermat Factorization
  • Wiener Attack
  • Pollards P-1 (Not a good implementation)
  • Pollards Rho (Fairly Broken)

RSA specific methods

  • Partial Key Recovery for n/2 bits of the private key
  • TODO Partial Key Recovery for n/4 bits of the private key
  • Chinese Remainder Theorem full private key recovery
  • Decoding despite invalid Public Exponent

Low Public Exponent

  • Hastad's Broadcast Attack
  • Hastad's Broadcast Attack with Linear Padding
  • Common Modulus, Common public Exponent
  • Python RSA bleichenbacher-06 signature forgery
  • Known message format/prefix
  • Coppersmith Shortpad Attack

Diffie Hellman

  • Baby Step Giant Step Algorithm
  • Pollards Kangaroo/Lambda Algorithm

Pairings

  • Rogue Public Key for BLS signatures
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].