A simple Python 3 script to perform Common Modulus attacks on RSA
☆39Dec 17, 2019Updated 6 years ago
Alternatives and similar repositories for RSA-Common-Modulus-Attack
Users that are interested in RSA-Common-Modulus-Attack are comparing it to the libraries listed below
Sorting:
- Pi-hole Remote Code Execution authenticated Version >= 4.3.2☆11Aug 5, 2020Updated 5 years ago
- https://stackoverflow.com/questions/33052406/invalid-compressed-data-format-violated☆26Sep 13, 2020Updated 5 years ago
- Convert kirbi ticket from mimikatz into hashcat format to crack it☆13Mar 5, 2019Updated 7 years ago
- Hackthebox weekly boxes writeups.☆15Sep 16, 2023Updated 2 years ago
- Ruby script that calls an almost interactive shell via WinRM (TCP/5985) on an Windows machine, relaying on a valid Kerberos ticket. (Very…☆18Sep 7, 2019Updated 6 years ago
- Extracting bits from Microscope images of ROM Constants, and disassembling them into readable 8051 assembly code☆22Mar 22, 2021Updated 4 years ago
- 🔅 Reverse shell written on python3☆14Dec 12, 2020Updated 5 years ago
- Script to check Kali Linux configs☆25Jan 14, 2019Updated 7 years ago
- OS Command Execution☆28Aug 23, 2018Updated 7 years ago
- Mobile Pentesting Guide (WIP)☆25May 13, 2020Updated 5 years ago
- Shell reverse creator, python, perl, ruby, bash, netcat, php, java, python3, PowershellTCP, PowershellUDP, PowershellICMP ....☆26Apr 24, 2018Updated 7 years ago
- Plugins for airgeddon☆47Nov 4, 2025Updated 4 months ago
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆80Jan 30, 2019Updated 7 years ago
- avarehelper☆12Aug 15, 2021Updated 4 years ago
- TWRP tree Unified for OnePlus 8/8 Pro (instantnoodle, instantnoodlep)☆27Dec 27, 2020Updated 5 years ago
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- Utility that can be used to decrypt HPQPswd encrypted passwords.☆43Jan 28, 2023Updated 3 years ago
- A Python based ingestor for BloodHound☆85Sep 26, 2022Updated 3 years ago
- Verilog bit slicing for python☆10May 13, 2021Updated 4 years ago
- Bitcoin Hardware Wallet Interaction scripts☆11Jan 30, 2026Updated last month
- The 9esim mini tool is a external (or we called extension) LPA on a board, which based on ESP32S3.☆13Dec 19, 2024Updated last year
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- Good code.☆17Nov 18, 2018Updated 7 years ago
- A quantum enhanced, totaly private encryption app that uses true random key generation from zero point energy.☆13Jul 2, 2025Updated 8 months ago
- ☆12Feb 26, 2026Updated last week
- Repository of now harmless TREZOR security exploits☆11Jun 14, 2015Updated 10 years ago
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- Linux kernel exploits for local privilege escalation☆81Sep 11, 2018Updated 7 years ago
- decode bits into bytes☆46Apr 30, 2020Updated 5 years ago
- Cheat sheet☆37Dec 16, 2019Updated 6 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- Encrypt and Decrypt message using Ethereum keys.☆12Mar 6, 2020Updated 6 years ago
- Inspecting the Moto Audio application running on Motorola Android devices☆10Aug 28, 2021Updated 4 years ago
- A tiny program to solve the thousand captcha image for testing the quality of the OCR. (Optical character recognition)☆13Aug 3, 2019Updated 6 years ago
- Python port of UMSKT☆12May 5, 2024Updated last year
- implementation of OEIS sequences☆11Nov 30, 2016Updated 9 years ago
- Cross-Domain DPA Attack on SAML11☆17Jul 14, 2019Updated 6 years ago
- A centralized Python botnet that currently supports HTTP, TCP and UDP flood attacks.☆14Jul 6, 2025Updated 7 months ago
- Firmware images for hacking, reverse engineering, and teardown of the Ryze / DJI / Intel Movidius Tello☆10Dec 6, 2018Updated 7 years ago