Developed by: Human Logic & Coding with AI Assistance (Claude Sonnet 4.5)
Core Technologies:
Quantum Backends:
Development & Testing:
** Available in:** English | Português | Español |
Houdinis is a comprehensive quantum cryptography exploitation framework designed for security researchers, penetration testers, and quantum computing enthusiasts. The framework provides tools to test quantum algorithms, evaluate cryptographic vulnerabilities, and benchmark quantum computing backends.
Experience Houdinis in your browser without installing anything:
Click to start an interactive 5-minute tutorial with:
- Live quantum circuit execution
- Grover's algorithm demo
- RSA security analysis
- Interactive visualizations
Runs completely in your browser powered by MyBinder.org
** Official Documentation** - Complete API documentation and user guides
** Quick Start Guide** - Get started in 10 minutes
** Installation Guide** - Multi-platform installation instructions
** Introduction** - Framework overview and concepts
Additional Documentation:
- Complete Documentation Index - Comprehensive documentation index
- Docker Guide - Containerization with Rocky Linux 9
- Implementation Details - Technical implementation guide
- Backend Support - Quantum computing platforms supported
- Documentation Guide - For contributors to documentation
- IBM Quantum Experience - Access to real quantum hardware and cloud simulators
- NVIDIA cuQuantum - GPU-accelerated quantum circuit simulation
- Amazon Braket - AWS quantum computing service with multiple hardware providers
- Microsoft Azure Quantum - Enterprise quantum cloud platform
- Google Cirq - Research-oriented quantum computing framework
- PennyLane - Quantum machine learning and optimization
- Shor's Algorithm - RSA and ECC key factorization
- Grover's Algorithm - Symmetric key brute force acceleration
- Quantum Network Scanning - Identify quantum-vulnerable systems
- Post-Quantum Migration Tools - Assess cryptographic transition needs
- TLS/SSL Quantum Assessment - Evaluate transport layer security
- Multi-platform benchmarking - Compare performance across backends
- NISQ algorithm optimization - Noisy Intermediate-Scale Quantum device support
- Quantum machine learning - Cryptanalysis using QML techniques
- Harvest Now, Decrypt Later - Future quantum threat assessment
Zero installation required! Launch an interactive environment:
Perfect for:
- Learning quantum cryptography
- Testing small quantum circuits
- Exploring framework features
- Quick demos and prototyping
For production use and full features:
git clone https://github.com/maurorisonho/Houdinis.git
cd Houdinis
pip install -r requirements.txt
python main.py# Core quantum computing libraries
pip install qiskit qiskit-aer qiskit-ibmq-provider
pip install cirq pennylane
# Cloud platform SDKs
pip install amazon-braket-sdk azure-quantum
pip install cuquantum-python # Requires NVIDIA GPU
# Framework dependencies
pip install numpy scipy matplotlib networkx
pip install cryptography paramiko requestsTest the installation and basic framework functionality:
# Main framework test
python3 tests/test_houdinis.py
# Or using pytest (if installed)
pytest tests/# Quick access from project root
./docker-run.sh test
./setup-docker.sh
./build-docker.sh
# Or from docker directory
cd docker/
./docker-manager.sh test
./run-docker.sh --test
# Or with Docker Compose
cd docker/
./docker.sh compose-testFor detailed information about tests, structure, debugging and contributions, see:
tests/README.md - Complete test documentation
from core.session import Session
from core.cli import CLI
# Initialize Houdinis session
cli = CLI()
cli.start()
# Load quantum modules
use auxiliary/quantum_config
use exploits/rsa_shor# IBM Quantum configuration
houdinis> use auxiliary/quantum_config
houdinis> set BACKEND ibm_quantum
houdinis> set TOKEN your_ibm_token_here
houdinis> run
# NVIDIA cuQuantum configuration
houdinis> set BACKEND nvidia_cuquantum
houdinis> set GPU_DEVICE 0
houdinis> run# Shor's algorithm RSA factorization
houdinis> use exploits/rsa_shor
houdinis> set TARGET_NUMBER 15
houdinis> set BACKEND ibmq_qasm_simulator
houdinis> run
# Grover's algorithm brute force
houdinis> use exploits/grover_bruteforce
houdinis> set TARGET_KEY_SIZE 64
houdinis> set BACKEND nvidia_cuquantum
houdinis> run# Compare algorithm performance across backends
houdinis> use exploits/multi_backend_benchmark
houdinis> set ALGORITHM shor
houdinis> set QUBITS 8
houdinis> set BACKENDS all
houdinis> set RUNS 5
houdinis> runMulti-platform quantum backend configuration module.
Options:
BACKEND: Target quantum computing platformTOKEN: Authentication token for cloud servicesHUB/GROUP/PROJECT: IBM Quantum access parametersDEVICE_ID: Specific quantum device selection
Supported Backends:
ibm_quantum- IBM Quantum Experiencenvidia_cuquantum- NVIDIA GPU simulationamazon_braket- AWS Braket serviceazure_quantum- Microsoft Azure Quantumgoogle_cirq- Google quantum computingpennylane- Quantum ML platform
Implements Shor's algorithm for RSA key factorization.
Options:
TARGET_NUMBER: Number to factorize (default: 15)BACKEND: Quantum backend to useQUBITS: Number of qubits (auto-calculated)SHOTS: Measurement repetitions (default: 1024)
Grover's algorithm for symmetric key brute force.
Options:
TARGET_KEY_SIZE: Key size in bits (default: 64)SEARCH_SPACE: Search space size (default: 2^16)ORACLE_TYPE: Oracle implementation typeITERATIONS: Grover iterations (auto-calculated)
Performance comparison across quantum backends.
Options:
ALGORITHM: Algorithm to benchmark (shor, grover, qft, vqe)QUBITS: Circuit size (default: 4)BACKENDS: Backends to test (default: all)RUNS: Benchmark runs per backend (default: 3)SAVE_RESULTS: Save results to JSON file
Identifies systems vulnerable to quantum attacks.
Options:
TARGET: Target network or hostCHECK_TLS: Scan TLS/SSL configurationsCHECK_SSH: Analyze SSH key algorithmsQUANTUM_TIMELINE: Years until quantum threat (default: 15)
General network reconnaissance with quantum awareness.
Options:
TARGET: Target network rangePORTS: Ports to scan (default: common)CRYPTO_ANALYSIS: Perform cryptographic analysisOUTPUT_FORMAT: Report format (json, xml, txt)
TLS/SSL quantum decryption simulation.
Framework banner and version information.
| Backend | Type | Performance | Cost | Use Case |
|---|---|---|---|---|
| IBM Quantum | Real Hardware | Medium | Free Tier | Research, Education |
| NVIDIA cuQuantum | GPU Simulation | Very High | Local GPU | Large Simulations |
| Amazon Braket | Cloud | High | Pay-per-use | Production, Hybrid |
| Azure Quantum | Cloud | High | Enterprise | Business Applications |
| Google Cirq | Simulation | Medium | Free | Algorithm Development |
| Algorithm | IBM Quantum | NVIDIA cuQuantum | Amazon Braket | Azure Quantum |
|---|---|---|---|---|
| Shor (8 qubits) | 45.2s | 2.1s | 12.7s | 18.3s |
| Grover (6 qubits) | 32.1s | 1.3s | 8.9s | 14.2s |
| QFT (5 qubits) | 28.5s | 0.8s | 6.2s | 9.7s |
Comprehensive Jupyter notebooks with detailed examples:
Shors_Algorithm_RSA_Exploitation.ipynb- RSA factorization tutorialGrovers_Algorithm_Symmetric_Key_Attacks.ipynb- Symmetric key attacksPost_Quantum_Cryptography_Analysis.ipynb- PQC migration guideQuantum_Machine_Learning_Cryptanalysis.ipynb- QML techniquesMulti_Backend_Performance_Comparison.ipynb- Backend benchmarking
Main framework configuration:
[DEFAULT]
framework_name = Houdinis
version = 1.0.0
author = Mauro Risonho de Paula Assumpção aka firebitsbr
[quantum]
default_backend = ibm_quantum
max_qubits = 20
default_shots = 1024
[security]
enable_logging = true
log_level = INFOThis framework is designed for:
- Security research and vulnerability assessment
- Educational purposes and quantum computing learning
- Cryptographic analysis and post-quantum migration planning
- Algorithm benchmarking and performance evaluation
- Only test systems you own or have explicit permission to test
- Respect cloud platform terms of service and usage limits
- Use findings to improve security, not to cause harm
- Report vulnerabilities responsibly through proper channels
Users are responsible for complying with applicable laws and regulations. The authors assume no liability for misuse of this framework.
git clone https://github.com/firebitsbr/Houdinis.git
cd Houdinis
pip install -r requirements.txt
pip install -r requirements-dev.txt # Development dependencies
# Run tests
python -m pytest tests/
# Code formatting
black . && flake8 .- Fork the repository
- Create a feature branch
- Implement your changes with tests
- Ensure code quality (black, flake8, mypy)
- Submit a pull request with detailed description
- Implement backend class in
quantum/backend.py - Add configuration support in
auxiliary/quantum_config.py - Update
requirements.txtwith new dependencies - Add documentation to
BACKENDS.md - Include example in demo scripts
MIT License
Copyright (c) 2025 Mauro Risonho de Paula Assumpção aka firebitsbr
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
- IBM Quantum Team - Qiskit and quantum computing access
- NVIDIA - cuQuantum GPU acceleration
- Amazon Web Services - Braket quantum computing service
- Microsoft - Azure Quantum platform
- Google - Cirq quantum computing framework
- Xanadu - PennyLane quantum machine learning
- Quantum Computing Community - Research and collaboration
- Claude Code for AI-assisted development and code optimization
** What works automatically:**
- Lint & Code Quality (Black, flake8, Pyright)
- Security Scanning (Bandit, Safety, Trivy)
- Automated Tests (pytest on 3 Python versions, 3 OSes)
- Docker Builds
- Package Building
- Coverage Reports (Codecov)
** Requires simple configuration (5 minutes):**
- PyPI Publishing: Requires
PYPI_API_TOKENsecret - See complete configuration guide
** Documentation:**
- GitHub Actions Pipeline - CI/CD Details
- Infrastructure Guide - Cloud deployment and costs
Development: FUNCTIONAL (no configuration required)
PyPI Publishing: OPTIONAL (requires token)
Cloud Deploy: NOT CONFIGURED (requires paid infrastructure)
Quantum Hardware: NOT CONFIGURED (requires access)
Metrics:
- 397 functions analyzed
- 75.3% type coverage (299/397 functions)
- 97.2% docstring coverage (386/397 functions)
- 0 unused imports
Tools:
# Validate code quality
python scripts/check_quality.py
# Type checking
pyright .
# Auto-format
black . && isort .** Documentation:**
- Code Quality Plan - Roadmap to 9.5/10
- Quality Script - Automated validation
- GitHub Issues: Report bugs and feature requests
- Discussions: Community discussions and Q&A
- Email: mauro.risonho@gmail.com
- Twitter: @firebitsbr
Houdinis Framework - Making quantum cryptography testing accessible to everyone.
"Any sufficiently advanced cryptography is indistinguishable from magic... until quantum computers arrive."