peda
RsaCtfTool
Our great sponsors
peda | RsaCtfTool | |
---|---|---|
7 | 9 | |
5,739 | 5,224 | |
- | 2.8% | |
0.0 | 9.0 | |
2 months ago | 23 days ago | |
Python | Python | |
GNU General Public License v3.0 or later | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
peda
- Emulating an emulator inside itself. Meet Blink
- Are there any cpu emulators that could help me learn i386 assembly?
-
GDB Verbose Output
Looks like they are using PEDA.
-
Hacked GDB Dashboard Puts It All on Display
There are a lot of these types of tools already in the reverse engineering community (in order of lowest chance of breaking when you throw really weird stuff at it):
GEF: https://gef.readthedocs.io/en/master/
PWNDBG: https://github.com/pwndbg/pwndbg
PEDA: https://github.com/longld/peda
They also come with a slew of different features to aid in RE/exploit dev, but many of them are also useful for debugging really weird issues.
-
Awesome CTF : Top Learning Resource Labs
PEDA - GDB plugin (only python2.7).
-
Awesome Penetration Testing
peda - Python Exploit Development Assistance for GDB.
-
GDB PEDA not being used by default?
Did you follow the instructions? Step 2 adds PEDA to your ~/.gdbinit so it will/should load every time you open gdb. So if it doesn't work check your ~/.gdbinit file.
RsaCtfTool
-
RSA encryption
Appreciate your insight! After a quick search I found this one https://github.com/RsaCtfTool/RsaCtfTool . Probably gonna give it a try
-
Decryption w/o a key
To check some base vulnerabilities you can use https://github.com/Ganapati/RsaCtfTool
-
Awesome CTF : Top Learning Resource Labs
RSACTFTool - A tool for recovering RSA private keys with various attacks.
- RsaCtfTool: RSA attack tool (mainly for ctf) - retreive private key from weak public key and/or uncipher data
-
Awesome Penetration Testing
RsaCtfTool - Decrypt data enciphered using weak RSA keys, and recover private keys from public keys using a variety of automated attacks.
- RsaCtfTool
- RSA POISONING ATTACK , FACTORIZATION BIG INTEGERS
-
picoCTF 2021 -Mind your Ps and Qs writeup-
Normally, it is better to implement the RSA cryptosystem and solve the problem, but in actual CTF, it is necessary to solve the problem as fast as possible, and in this article, we will use RsaCtfTool(https://github.com/Ganapati/RsaCtfTool ), which can solve the RSA cryptosystem quickly in CTF. In this article, we will use RsaCtfTool, which can solve RSA cryptosystem quickly by CTF. It is very simple to use, just give c, n, and e as optional arguments, and the plaintext will be returned.
- Show HN: RSA Multi Attacks Tool
What are some alternatives?
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
hashcat - World's fastest and most advanced password recovery utility
pwndbg - Exploit Development and Reverse Engineering with GDB Made Easy
CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
pwntools - CTF framework and exploit development library
dvcs-ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG...
mimikatz - A little tool to play with Windows security
objection - 📱 objection - runtime mobile exploration
RSA-Cipher - Python program to encrypt/decrypt or generate key pairs using RSA Algorithm
Metasploit - Metasploit Framework
cryptotools