key-recovery
Here are 15 public repositories matching this topic...
A 3D Visual Mnemonic Game for Key Recovery
-
Updated
Apr 29, 2020 - C#
A key-recovery attack for LINE for Android's chat backup encryption.
-
Updated
Jun 4, 2018 - Go
ECDSA nonce-reuse attack to recover a private key.
-
Updated
Nov 11, 2020 - Python
Performs key-recovery attacks on the SoDark family of algorithms.
-
Updated
Nov 30, 2021 - C
Encrypt and decrypt your data securely using custom security questions — with all processing handled entirely offline
-
Updated
Sep 4, 2025 - JavaScript
You deleted your only copy of an OpenPGP private key file. You wonder if the key material can be recovered via forensic techniques such as file carving. Dodge may be able to help!
-
Updated
Jan 9, 2024 - Shell
Finding Complete Impossible Differential Attacks on AndRX Ciphers and Efficient Distinguishers for ARX Designs
-
Updated
Jun 26, 2025 - MiniZinc
A configuration enabling the Scalpel data recovery / data carving tool to work with deleted private key data!
-
Updated
Jan 9, 2024
Recovers keys from Windows, Office, and a few other products made by Microsoft
-
Updated
Oct 29, 2020 - Visual Basic .NET
A cross-platform, security-first CLI for .vult vault file operations - built and tested in a full CI/CD pipeline with automated linting, fuzzing, multi-platform builds, and regression tests.
-
Updated
Aug 8, 2025 - Go
A side-channel analysis project implementing a Prime+Probe cache attack to recover AES encryption keys by analyzing first-round T-table accesses. Includes parallelized data processing, statistical analysis, and heatmap visualization.
-
Updated
May 31, 2025 - Python
That Fun Time I Made A New OpenPGP Keypair, Got My Public Key Signed By Richard Stallman Himself, Deleted My Only Copy Of The Private Key The Next Day, And Used Crude Forensics Techniques To Recover The Lost Key Material Four Days Later
-
Updated
May 14, 2019
Java-based AES-128 round key inverter for reversing key expansion to recover the original encryption key — ideal for cryptography research and security analysis.
-
Updated
Aug 19, 2025 - Java
Improve this page
Add a description, image, and links to the key-recovery topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the key-recovery topic, visit your repo's landing page and select "manage topics."