rsatool can be used to calculate RSA and RSA-CRT parameters
☆1,569Jan 12, 2025Updated last year
Alternatives and similar repositories for rsatool
Users that are interested in rsatool are comparing it to the libraries listed below
Sorting:
- RSA attack tool (mainly for ctf) - retrieve private key from weak public key and/or uncipher data☆6,838Mar 2, 2026Updated 2 weeks ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,860Sep 6, 2023Updated 2 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,867Dec 25, 2023Updated 2 years ago
- enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts☆1,380Apr 23, 2025Updated 10 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,539Updated this week
- Windows / Linux Local Privilege Escalation Workshop☆2,058Oct 9, 2022Updated 3 years ago
- Linux privilege escalation auditing tool☆6,420Feb 19, 2026Updated last month
- Red Teaming & Pentesting checklists for various engagements☆2,646Jul 27, 2025Updated 7 months ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆76,106Updated this week
- JAWS - Just Another Windows (Enum) Script☆1,930Apr 19, 2021Updated 4 years ago
- A tool to analyze multi-byte xor cipher☆1,477May 21, 2025Updated 10 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆636Nov 6, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆69,539Updated this week
- GTFOBins is a curated list of Unix-like executables that can be used to bypass local security restrictions in misconfigured systems.☆12,816Mar 3, 2026Updated 2 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆15,560Updated this week
- Various *nix tools built as statically-linked binaries☆3,636Aug 21, 2023Updated 2 years ago
- A Python implementation of the Wiener attack on RSA public-key encryption scheme.☆537Feb 24, 2024Updated 2 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,279Aug 20, 2024Updated last year
- Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and…☆3,310Nov 16, 2025Updated 4 months ago
- ☆2,748Aug 7, 2024Updated last year
- An automated, modular cryptanalysis tool; i.e., a Weapon of Math Destruction☆1,118Dec 2, 2021Updated 4 years ago
- Welcome! This is where I'll post updates to projects I'm working on, walkthroughs to capture the flag material and any other areas of res…☆50May 4, 2021Updated 4 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12,912Aug 17, 2020Updated 5 years ago
- Exploitation paths allowing you to (mis)use the Windows Privileges to elevate your rights within the OS.☆2,415Feb 24, 2023Updated 3 years ago
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,802Apr 25, 2024Updated last year
- Some setup scripts for security research tools.☆9,323Mar 1, 2026Updated 3 weeks ago
- An easy-to-setup version of XSS Hunter. Sets up in five minutes and requires no maintenance!☆2,283Mar 7, 2024Updated 2 years ago
- CTF framework and exploit development library☆13,315Mar 5, 2026Updated 2 weeks ago
- attacking RSA via lattice reductions (LLL)☆832Apr 11, 2021Updated 4 years ago
- Fast web fuzzer written in Go☆15,750Apr 24, 2025Updated 10 months ago
- Proof of Concept for CVE-2019-18634☆237Sep 12, 2021Updated 4 years ago
- Fast subdomains enumeration tool for penetration testers☆10,855Aug 2, 2024Updated last year
- ☆221Jul 20, 2020Updated 5 years ago
- ☆1,159Apr 21, 2021Updated 4 years ago
- detect stegano-hidden data in PNG & BMP☆1,547Jan 28, 2026Updated last month
- hydra☆11,719Feb 7, 2026Updated last month
- Search gtfobins and lolbas files from your terminal☆462Jul 13, 2022Updated 3 years ago
- A curated list of awesome YARA rules, tools, and people.☆4,163Updated this week
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆4,504Jan 10, 2025Updated last year