Pinned Repositories
backdoor-ecdsa
backdoored ECDSA signatures yum!
bitcoin-sighash-scan
An educational tool to scan for SIGHASH_SINGLE vulnerable addresses on the blockchain using bitcoin-core
BitcoinExprCracker
Este projeto é fruto de um estudo pessoal sobre o algoritmo Secp256k1. O objetivo dele é conseguir obter, usando apenas os valores da chave pública, o valor correto da chave privada.
blog
Blog posts
CryptoDeepTools
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Dual-Vanity
Generate a Bitcoin Address with Specified Prefix and Suffix
ecdsa-polynomial-nonce-recurrence-attack
Kangaroo
Pollard's kangaroo for SECPK1
LostWallets
Find passwords from wallet.dat get 50% balance
paranoid_crypto
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
Hurd8x's Repositories
Hurd8x/backdoor-ecdsa
backdoored ECDSA signatures yum!
Hurd8x/bitcoin-sighash-scan
An educational tool to scan for SIGHASH_SINGLE vulnerable addresses on the blockchain using bitcoin-core
Hurd8x/BitcoinExprCracker
Este projeto é fruto de um estudo pessoal sobre o algoritmo Secp256k1. O objetivo dele é conseguir obter, usando apenas os valores da chave pública, o valor correto da chave privada.
Hurd8x/blog
Blog posts
Hurd8x/CryptoDeepTools
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Hurd8x/Dual-Vanity
Generate a Bitcoin Address with Specified Prefix and Suffix
Hurd8x/ecdsa-polynomial-nonce-recurrence-attack
Hurd8x/Kangaroo
Pollard's kangaroo for SECPK1
Hurd8x/LostWallets
Find passwords from wallet.dat get 50% balance
Hurd8x/paranoid_crypto
Paranoid's library contains implementations of checks for well known weaknesses on cryptographic artifacts.
Hurd8x/rsz
Retrieve ECDSA signature R,S,Z values from blockchain rawtx or txid.
Hurd8x/SSL-TLS-ECDSA-timing-attack
Timing Attack on TLS' ECDSA signature
Hurd8x/Twist-Attack
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
Hurd8x/challenges
Replay CTF challenges by Amossys, write-ups, etc.
Hurd8x/Private-Key-Search-and-Ultra-Lightweight-Database-with-Public-Keys
This allows the representation of thousands of public keys to be stored in just a few lines, making the database lightweight and easy to manage.
Hurd8x/Twist-Attack-Sub-Group-Attack
Twist and SubGroup attack on the ECDSA SECP256k1