RsaCtfTool is a utility designed to decrypt data from weak RSA public keys and attempt to recover corresponding private keys. The tool combines multiple integer factorization algorithms to enhance decryption capabilities against RSA encryption. The tool focuses on exploiting the complexity of the integer factorization problem that underlies RSA security. It offers various attack strategies and methods for attempting to crack RSA encryption, particularly targeting weak implementations. RsaCtfTool is primarily intended for educational purposes and CTF competitions. The tool supports RSA textbook semiprime composite modulus but does not support composite multiprimes due to upstream limitations in the pycrypto library. Users should note that not every RSA key can be broken within a reasonable timeframe, as the complexity of properly implemented RSA encryption presents significant computational challenges. For more advanced integer factorization requirements, the tool documentation recommends using specialized tools like msieve or yafu.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A suite of tools for Wi-Fi network security assessment and penetration testing.
PyBOF is a Python library that enables in-memory loading and execution of Beacon Object Files (BOFs) with support for argument passing and function targeting.
A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.
Kali Linux is a specialized Linux distribution for cybersecurity professionals, focusing on penetration testing and security auditing.
AHHHZURE is an automated deployment script that creates vulnerable Azure cloud lab environments for offensive security training and cloud penetration testing practice.
Tool for enumerating proxy configurations and generating CobaltStrike-compatible shellcode.
Parrot Security OS is a comprehensive, secure, and customizable operating system for cybersecurity professionals, offering over 600+ tools and utilities for red and blue team operations.
An Azure Function that validates and relays Cobalt Strike beacon traffic based on Malleable C2 profile authentication.
A CVE compliant archive of public exploits and corresponding vulnerable software, and a categorized index of Internet search engine queries designed to uncover sensitive information.