๐Ÿ” LKS Crypto Toolkit v2.0 PRO

๐Ÿ”ค Caesar / ROT Cipher

๐Ÿ”‘ Vigenรจre Cipher

๐Ÿ“ Affine Cipher

๐Ÿ”„ Substitution Cipher

๐Ÿ“ก Morse Code

โฌ› Atbash Cipher

๐Ÿ”ข RSA Calculator

โš”๏ธ RSA Attacks

Auto Attack v2 supports single input above + batch lines for multi-sample attacks.

๐Ÿ“ก Hastad's Broadcast Attack

Untuk e=3 dengan 3 ciphertext berbeda dan modulus berbeda

๐Ÿ”— Common Modulus Attack

Ketika 2 ciphertext pakai n sama tapi e berbeda (e1, e2 coprime)

๐Ÿ”ข Multi-prime RSA

RSA dengan lebih dari 2 prime factor

RSA Partial Key (Known Bits)

Recover p from known MSB/LSB bits. Brute small unknown bits, and generate Sage Coppersmith template for larger cases.

๐Ÿง  Baby ECC (CTF)

Curve: yยฒ = xยณ + ax + b (mod p). Computes S = k * point, then tries common XOR key derivations.

ECC Discrete Log Attack (BSGS)

Solve d from Q = dG on small/weak curves with bounded search.

DSA/ECDSA Nonce Reuse Attack

Recover k and private key x when two signatures share the same nonce (same r).

DSA/ECDSA Partial Nonce Leak (Known Bits)

Recover private key x when some nonce bits are known. Brute-force for small unknown bits, with HNP/Sage template for larger cases.

Optional filter with second signature + known k2 bits.

๐ŸŽฒ LCG Predictor

Linear Congruential Generator: X_{n+1} = (a*X_n + c) mod m

๐ŸŒ€ Mersenne Twister (MT19937)

Butuh 624 output berturut-turut untuk recover state

๐Ÿ“Š LFSR Helper

Linear Feedback Shift Register analysis

๐Ÿ”’ AES Mode Detector

Paste hex ciphertext untuk detect mode

๐ŸŽญ ECB Cut & Paste

ECB mode encrypts identical blocks to identical ciphertext

๐Ÿ”€ CBC Bit-Flipping Calculator

Modify ciphertext to change plaintext after decryption

CBC Padding Oracle Attack Helper

Manual helper after oracle phase: use recovered intermediate state to decrypt/forge blocks.

CTR/OFB Nonce Reuse Attack

Same nonce + key reuses keystream. XOR ciphertexts to get XOR plaintexts.

GCM Nonce Reuse - Recover Auth Key

One-block, no-AAD case: derive GHASH key H from (C1,T1) and (C2,T2) under same nonce.

๐Ÿ“š AES Mode Cheatsheet

Mode Vulnerability Attack
ECB Same plaintext โ†’ same ciphertext Block swapping, pattern analysis
CBC IV reuse, bit-flipping Padding oracle, bit-flip to modify plaintext
CTR Nonce reuse XOR ciphertexts to get XOR of plaintexts
GCM Nonce reuse Authentication bypass, forgery

๐Ÿ”‘ Hash Identifier

๐Ÿ“ Length Extension Attack

Untuk MD5, SHA1, SHA256 (Merkle-Damgรฅrd construction)

โŠ• XOR Tool

๐Ÿ“ฆ Multi-Encoder

๐Ÿ”ข Number Converter

๐Ÿ”ค ASCII Table

๐Ÿšฉ Flag Formats

flag{...} | FLAG{...} | CTF{...} | LKS{...} | picoCTF{...} | HTB{...}
Copied!