Example Usage
Powerful RSA cracker for CTFs. Supports RSA, X509, OPENSSH, PKCS#12, PKCS#7, and CSR in PEM and DER formats.
Usage: rsacracker [OPTIONS]
Options:
-r, --raw <RAW> Retrieve values from raw file
-c, --cipher <CIPHER> Cipher: the message to uncipher. Can be specified multiple times for multi-key attacks
-f, --cipherfile <CIPHERFILE> Cipher file: the file to uncipher. Can be specified multiple times for multi-key attacks
-o, --outfile <OUTFILE> Write unciphered data to a file. If many unciphered data are found, they will be written to files suffixed with _1, _2, ...
-n <N> Modulus. Can be specified multiple times for multi-key attacks
-e <E> Public exponent. Default: 65537. Can be specified multiple times for multi-key attacks
-p <P> Prime number p (supports wildcards: 0xDEADBEEF????, 10737418??, 0x...C0FFEE, 0xDEADBEEF..., etc.)
-q <Q> Prime number q (supports wildcards: 0x????C0FFEE, ??741827, 0x...C0FFEE, 0xDEADBEEF..., etc.)
-d <D> Private exponent
--phi <PHI> Phi or Euler'