A toolbox for extracting RSA private keys from public keys.
☆189Sep 30, 2021Updated 4 years ago
Alternatives and similar repositories for rsacrack
Users that are interested in rsacrack are comparing it to the libraries listed below
Sorting:
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- backdoor that uses dns to communicate☆34Aug 9, 2025Updated 7 months ago
- A PoC executing shellcode in Dart☆16Jun 28, 2022Updated 3 years ago
- Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)☆275Jan 13, 2022Updated 4 years ago
- CVE-2020-5837 exploit☆42May 13, 2020Updated 5 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.☆60Aug 21, 2024Updated last year
- A utility to fix intentionally corrupted UPX packed files.☆93May 22, 2023Updated 2 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- A C implementation of the Sektor7 "A Thief" Windows privesc technique.☆70Mar 25, 2022Updated 3 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated 2 weeks ago
- ☆14Sep 2, 2020Updated 5 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- jolokia-exploitation-toolkit☆311Dec 19, 2024Updated last year
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- Locate intersting files in grayhatwarfare.com open S3 buckets and Azure blobs automatically!☆28Apr 6, 2022Updated 3 years ago
- Exploiting CVE-2021-44228 in vCenter for remote code execution and more.☆107Dec 22, 2021Updated 4 years ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enough☆87Jun 16, 2021Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Dec 23, 2020Updated 5 years ago
- ecdsattack is a package which retrieves private keys from faulted ECDSA signatures.☆45Nov 28, 2022Updated 3 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- A Zeek package to detect CVE-2021-42292, a Microsoft Excel local privilege escalation exploit.☆18Nov 11, 2021Updated 4 years ago
- Simple project using syscalls (via Syswhispers2) to execute MessageBox shellcode.☆76Nov 12, 2021Updated 4 years ago
- Convert shellcode into different formats!☆357Jan 24, 2023Updated 3 years ago
- TightVNC Vulnerability.☆16Jan 26, 2022Updated 4 years ago
- ChatGPT queries via OpenAI API in your terminal☆61Feb 14, 2023Updated 3 years ago
- CallBack-Techniques for Shellcode execution ported to Nim☆61Mar 19, 2021Updated 5 years ago
- Buggy script to play with GPOs☆122Dec 27, 2024Updated last year
- Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)☆479Nov 11, 2021Updated 4 years ago
- A .NET tool for exporting and importing certificates without touching disk.☆502Oct 8, 2021Updated 4 years ago
- Crack MSCHAPv2 challenge/responses quickly using a database of NT hashes☆140Mar 19, 2024Updated 2 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- ☆10Jun 29, 2022Updated 3 years ago
- Some Python tooling to for example try to decrypt CyberArk .cred credential files☆59Apr 29, 2023Updated 2 years ago
- A quick example of the Hells Gate technique in Nim☆93Aug 11, 2021Updated 4 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated last month
- OSINT tool for discovering the real IP addresses of services which are behind Cloudflare but not properly locked down☆155May 1, 2024Updated last year