Imam Uasa (Merricx)

Merricx

Geek Repo

Location:Indonesia

Home Page:https://merri.cx

Github PK Tool:Github PK Tool

Imam Uasa's starred repositories

wtfpython

What the f*ck Python? 😱

Language:PythonLicense:WTFPLStargazers:35589Issues:749Issues:197

nuclei

Fast and customizable vulnerability scanner based on simple YAML based DSL.

traitor

:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

paseto

Platform-Agnostic Security Tokens

Language:PHPLicense:NOASSERTIONStargazers:3240Issues:76Issues:82

sage

Main repository of SageMath

Language:PythonLicense:NOASSERTIONStargazers:1278Issues:9Issues:35641

cryptocoding

Guidelines for low-level cryptography software

tfhe-rs

TFHE-rs: A Pure Rust implementation of the TFHE Scheme for Boolean and Integer Arithmetics Over Encrypted Data.

Language:RustLicense:NOASSERTIONStargazers:874Issues:19Issues:101

crypto-attacks

Python implementations of cryptographic attacks and utilities.

Language:PythonLicense:MITStargazers:868Issues:17Issues:16

RSA-and-LLL-attacks

attacking RSA via lattice reductions (LLL)

ed25519-dalek

Fast and efficient ed25519 signing and verification in Rust.

Language:RustLicense:BSD-3-ClauseStargazers:672Issues:24Issues:138

algebra

Libraries for finite field, elliptic curve, and polynomial arithmetic

Language:RustLicense:Apache-2.0Stargazers:589Issues:23Issues:302

x25519-dalek

X25519 elliptic curve Diffie-Hellman key exchange in pure-Rust, using curve25519-dalek.

Language:RustLicense:BSD-3-ClauseStargazers:325Issues:18Issues:49

JeanGrey

Tools to perform differential fault analysis attacks (DFA).

Language:PythonLicense:GPL-3.0Stargazers:280Issues:18Issues:5

kyber-py

A pure python implementation of ML-KEM (FIPS 203) and CRYSTALS-Kyber

Language:PythonLicense:MITStargazers:173Issues:4Issues:30

My-CTF-Challenges

Challenges I created for CTF competitions.

Language:PythonStargazers:170Issues:4Issues:0

Picnic

Reference implementation of the Picnic post-quantum signature scheme

Language:CLicense:MITStargazers:156Issues:17Issues:4

coppersmith

Coppersmith's method for multivariate polynomials

Inequality_Solving_with_CVP

CVP "trick" for CTF challenges

Language:SageStargazers:119Issues:4Issues:0

Castryck-Decru-SageMath

A SageMath implementation of the Castryck-Decru Key Recovery attack on SIDH

Language:SageLicense:MITStargazers:115Issues:7Issues:1

fancy-cryptography

Deployments of fancy cryptography

JWT-Key-Recovery

A tool that recovers the public key used to sign JWT tokens

Language:PythonLicense:MITStargazers:99Issues:4Issues:0

BreakingRainbow

Scripts for the 'Breaking Rainbow takes a Weekend on a Laptop' paper

aes-brute-force

Using Intel AES-NI and c++ threads to search an AES128 key (well, part of it)

Language:C++License:Apache-2.0Stargazers:71Issues:4Issues:3

LLL

A repository trying to collect things related to LLL

symbolic_mersenne_cracker

Models the mersenne twister used by Python Random as a symbolic program. This allows recovering the state given a few outputs

Language:PythonLicense:MITStargazers:60Issues:1Issues:2

CVE-2021-22911

Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1

cryptography

Some crypto scripts which is useful in study and ctf

Language:PythonStargazers:25Issues:1Issues:0
Language:RustLicense:BSD-3-ClauseStargazers:22Issues:3Issues:1

microca

microca is a small, simple Certificate Authority tool.

Language:GoLicense:MITStargazers:15Issues:1Issues:0

vision

Nobody see your vision, they walking around blindfolded

Language:CrystalLicense:MITStargazers:1Issues:1Issues:0