Exploit Notes

PEM (Privacy Enhanced Mail) Cracking

Last modified: 2022-12-01

Cryptography

PEM uses RSA encryption.

Decrypt

First of all, you need to format the PEM file to make the John to recognize it.

pem2john example.pem > hash.txt

Crack the hash.

john --wordlist=wordlist.txt hash.txt

Tools by HDKS

Fuzzagotchi

Automatic web fuzzer.

aut0rec0n

Auto reconnaissance CLI.

Hash Cracker

Hash identifier.