| 2019-02-24 11:46 | minor refactoring | mpizzzle | 12 | +48 | -42 |
| 2019-02-18 22:44 | attack outline finished (but not working) | mpizzzle | 3 | +65 | -3 |
| 2019-02-17 15:16 | removing unused methods | mpizzzle | 1 | +0 | -20 |
| 2019-02-17 15:15 | copied golang sha1 impl | mpizzzle | 2 | +258 | -0 |
| 2019-02-17 00:11 | challenge 27 complete | mpizzzle | 1 | +37 | -0 |
| 2019-02-16 23:03 | challenge 26 complete | mpizzzle | 1 | +23 | -0 |
| 2019-02-16 22:45 | challenge 25 complete | mpizzzle | 2 | +86 | -0 |
| 2019-02-16 20:06 | challenge 24 complete | mpizzzle | 1 | +32 | -0 |
| 2019-02-16 18:03 | refactoring duplicate classes | mpizzzle | 3 | +13 | -92 |
| 2019-02-16 17:43 | simplifying untemper 11 function | mpizzzle | 1 | +5 | -8 |
| 2019-02-16 17:30 | holy shit it works, challenge 23 complete | mpizzzle | 1 | +52 | -48 |
| 2018-12-23 00:34 | initial idea for xor untempering | mpizzzle | 1 | +93 | -0 |
| 2017-12-17 22:53 | challenge 22 using python random() implementation | mpizzzle | 1 | +19 | -0 |
| 2017-12-17 22:40 | set 3 challenge 22 complete | mpizzzle | 3 | +107 | -42 |
| 2017-11-06 20:44 | implementation for the mersenne twister (pseudocode ripped from wikipedia) | mpizzzle | 1 | +42 | -0 |
| 2017-11-05 21:54 | minor refactoring | mpizzzle | 2 | +5 | -7 |
| 2017-11-05 21:39 | set 3 challenge 19/20 pretty much complete (I get the gist) | mpizzzle | 3 | +123 | -3 |
| 2017-11-01 08:40 | temp commit | mpizzzle | 3 | +53 | -1 |
| 2017-10-31 21:23 | refactoring ctr encryption into method | mpizzzle | 1 | +10 | -10 |
| 2017-10-31 21:16 | set 3 challenge 18 complete | mpizzzle | 1 | +18 | -0 |
| 2017-10-31 20:23 | fixing the same off by 1 error in all challenges (even though it doesn't apply to some) | mpizzzle | 8 | +8 | -8 |
| 2017-10-31 20:13 | finally solved it ;_; | mpizzzle | 1 | +1 | -1 |
| 2017-10-31 19:34 | refactoring padding validation | mpizzzle | 1 | +1 | -1 |
| 2017-10-31 19:33 | renaming some methods | mpizzzle | 1 | +2 | -2 |
| 2017-10-30 21:42 | more pointless refactoring (issue still not fixed) | mpizzzle | 1 | +14 | -13 |
| 2017-10-30 20:51 | more minor changes | mpizzzle | 1 | +16 | -16 |
| 2017-10-30 20:35 | refactoring padding stripper | mpizzzle | 1 | +7 | -13 |
| 2017-10-30 20:19 | Set 3 Challenge 17 complete kind of, fucks up randomly | mpizzzle | 1 | +43 | -40 |
| 2017-10-30 18:54 | padding oracle finished, works (mostly) need to tidy code significantly | mpizzzle | 1 | +13 | -15 |
| 2017-10-30 17:56 | temp commit for challenge 17 | mpizzzle | 2 | +78 | -0 |
| 2017-10-30 17:55 | padding validation wasn't checking last byte, algorithm now fixed | mpizzzle | 3 | +7 | -12 |
| 2017-10-28 17:03 | minor refactors in several files | mpizzzle | 12 | +17 | -42 |
| 2017-10-28 16:21 | set 2 challenge 16 complete | mpizzzle | 1 | +27 | -0 |
| 2017-10-26 19:16 | set 2 challenge 15 complete | mpizzzle | 1 | +18 | -0 |
| 2017-10-24 17:59 | correcting pkcs7 padding implementation, now checking for padding length | mpizzzle | 3 | +20 | -13 |
| 2017-10-23 22:02 | set 2 challenge 13 complete | mpizzzle | 1 | +8 | -8 |
| 2017-10-23 19:56 | fixing case where prefix is multiple of AES.block_size | mpizzzle | 1 | +5 | -3 |
| 2017-10-21 20:36 | renaming some variables | mpizzzle | 1 | +29 | -25 |
| 2017-10-21 19:38 | now finding number of randomly prepended bytes | mpizzzle | 1 | +35 | -27 |
| 2017-10-21 16:16 | harder ecb crack done where len of prepended randon bytes is known | mpizzzle | 1 | +42 | -0 |
| 2017-10-21 14:49 | completely abstracting plaintext into oracle function | mpizzzle | 1 | +4 | -4 |
| 2017-10-21 13:41 | correcting ecb cracking, no longer modifying plaintext | mpizzzle | 2 | +37 | -13 |
| 2017-10-15 13:28 | merge from head | mpizzzle | 2 | +7 | -16 |
| 2017-10-15 13:24 | minor refactoring | mpizzzle | 9 | +53 | -59 |
| 2017-10-08 18:34 | minor refactoring | mpizzzle | 2 | +82 | -8 |
| 2017-10-08 17:25 | set 2 challenge 12 complete, a few steps missing though | mpizzzle | 1 | +31 | -0 |
| 2017-10-08 12:40 | set 2 challenge 11 complete (I think?) git push | mpizzzle | 1 | +42 | -0 |
| 2017-10-07 21:04 | set 2 challenge 10 complete | mpizzzle | 3 | +80 | -1 |
| 2017-10-07 20:28 | alternate solution for set 1 challenge 8 added | mpizzzle | 1 | +7 | -2 |
| 2017-10-07 18:55 | set 2 challenge 9 complete | mpizzzle | 1 | +6 | -0 |
| 2017-10-07 18:31 | set 1 challenge 8 complete (I think?) | mpizzzle | 2 | +220 | -0 |
| 2017-10-07 17:32 | set 1 challenge 7 complete | mpizzzle | 2 | +73 | -0 |
| 2017-10-07 15:34 | testing project euler 59 | mpizzzle | 2 | +15 | -7 |
| 2017-10-07 15:05 | touch aes_in_ecb_mode.py | mpizzzle | 1 | +0 | -0 |
| 2017-10-07 14:58 | more refactoring | mpizzzle | 1 | +8 | -10 |
| 2017-10-07 14:43 | more formatting | mpizzzle | 1 | +2 | -2 |
| 2017-10-07 14:41 | formatting | mpizzzle | 1 | +4 | -4 |
| 2017-10-07 14:36 | set 1 challenge 6 complete | mpizzzle | 1 | +47 | -3 |
| 2017-10-07 12:13 | hamming distance function done | mpizzzle | 1 | +7 | -0 |
| 2017-10-07 11:14 | touch break_repeating_key_xor.py | mpizzzle | 2 | +64 | -0 |
| 2017-10-07 11:09 | set 1 challenge 5 complete | mpizzzle | 1 | +11 | -0 |
| 2017-10-07 10:49 | alternate solutions for challenge 3 & 4 | mpizzzle | 2 | +43 | -0 |
| 2017-10-07 10:26 | set 1 challenge 4 complete | mpizzzle | 1 | +10 | -0 |
| 2017-10-06 16:24 | touch detect_single_character_xor.py | mpizzzle | 2 | +328 | -0 |
| 2017-10-06 16:17 | updated set 1 challenge 3 | mpizzzle | 1 | +1 | -2 |
| 2017-10-06 16:06 | set 1 challenge 3 complete | mpizzzle | 1 | +9 | -0 |
| 2017-10-06 14:28 | set 1 challenge 2 complete | mpizzzle | 1 | +7 | -0 |
| 2017-10-06 13:56 | set 1 challenge 1 complete | mpizzzle | 1 | +6 | -0 |
| 2017-10-06 13:41 | touch hex_to_base64.py | mpizzzle | 1 | +0 | -0 |