ktwzk / rsa-fermat-crack
It's an RSA-cracker, that uses Fermat's factorization method to get p and q.
☆14Updated 8 years ago
Related projects: ⓘ
- Tool to help guess a files 256 byte XOR key by using frequency analysis☆84Updated 6 years ago
- ☆75Updated this week
- Malware.lu tools☆63Updated 10 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆23Updated 9 years ago
- Platform for Browser Exploitation☆33Updated 9 years ago
- A tool for netpens.☆29Updated 5 years ago
- Automated memory forensics analysis☆32Updated 5 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 7 years ago
- tundeep☆42Updated 5 years ago
- post-exploitation tools☆15Updated 6 years ago
- Configuration security audit framework☆23Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆43Updated 5 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆25Updated 8 years ago
- ☆68Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆55Updated 9 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 9 years ago
- Cryptowall Tooling & Information☆35Updated 8 years ago
- ☆41Updated this week
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆42Updated 9 years ago
- Quick & dirty script to get info on a file from online resources (VirusTotal, Team Cymru, Shadow Server etc.)☆30Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆47Updated 5 years ago
- Megatron - A System for Abuse- and Incident Handling☆41Updated 7 years ago
- Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049☆50Updated 7 years ago
- ☆85Updated 9 years ago
- put this here because archival reasons.☆28Updated 6 years ago
- Mimosa Framework to abuse EPC functionality on CISCO Routers.☆30Updated 3 years ago
- Automatically exported from code.google.com/p/malware-lu☆55Updated 5 years ago