TeslaCrack
TeslaCrack copied to clipboard
Decryptor for the TeslaCrypt malware
I pulled this as the key: 8811106517749122387396306544400207294871116053309887778576518664178301264939320656920208097906596791502301012940291279838618778984913079372866311136903184 Which factors out at 2 · 2 · 2 · 2 · 23 · 457 · 463 · 2729 · 23764707731 · 1744815170161051248900308994924756256109406768546917854295618000464153623295035355691181383026704200051673336306676896452424627447107...
Hi, I ran this command: > python unfactor_ecdsa.py IMG_3267.JPG.vvv 2 3 643 608029 69755377 61206674463547 2640055505350166842011831270884389537881022481540999907428329 307350395247922573157070469565587371380533590999759725034121709 and have the no handler response. Havent found anything about it. Can someone...
Hello, I have an issue getting teslacrack to work with the old .ecc version(encryption happened in February of 2015). It just errors out with worddoc.doc.ecc doesn't appear to be TelsaCrypted....
Really impressed with your work! Was wondering if you can tell me what special purpose algorithm was used to factor the 512 bit key, and how you identified which special...
After I decrypted files with TeslaDecoder and TeslaCrack i had log of all decrypted files. (HUGE THANKS TO DEVELOPERS) Something like: ## Decryption started. DECRYPTED: C:\FolderToWork\3RDPARTY.TXT DECRYPTED: C:\FolderToWork\APPDATA\AD00001.zip And because...
For non-squarefree keys (ones with the same factor multiple times), the unfactor scripts waste resources by trying the same key multiple times. E.g. having "2 2 2" on the command...