Coppersmith's attack describes a class of attacks on the public-key cryptosystem RSA based on Coppersmith's theorem (see below). The public key in the RSA system is a tuple of integers , where N is the product of two primes p and q .
CVE & exploits
tutorials, training & CTF
Hackables/CTF/Games/Etc | IT Security
scan & analysing tools
formats & specifications
Skill Level How technically skilled is this group of threat agents? Motivation Level How motivated is this group of threat agents to find and exploit this vulnerability? Opportunity What resources and opportunity are required for this group of threat agents to find and exploit this vulnerability? Size How large is this group of threat agents? Ease of Discovery How easy is it for this group of threat agents to discover this vulnerability?
If you are involved in vulnerability research, reverse engineering or penetration testing, I suggest to try out the Python programming language. It has a rich set of useful libraries and programs. This page lists some of them. Most of the listed tools are written in Python, others are just Python bindings for existing C libraries, i.e. they make those libraries easily usable from Python programs. Some of the more aggressive tools (pentest frameworks, bluetooth smashers, web application vulnerability scanners, war-dialers, etc.) are left out, because the legal situation of these tools is still a bit unclear in Germany -- even after the decision of the highest court . This list is clearly meant to help whitehats, and for now I prefer to err on the safe side.