This tool is an implementation of the Bleichenbacher's attack on RSA PKCS1.5 padding
$ ./example_exploit.py -h
usage: example_exploit.py [-h] [-v] [--debug] -H HOST -P PORT -e EXPONENT -c CIPHERTEXT -n MODULUS
options:
-h, --help show this help message and exit
-v, --verbose Verbose mode. (default: False)
--debug Debug mode.
-H HOST, --host HOST Host to connect to.
-P PORT, --port PORT Port to connect to.
-e EXPONENT, --exponent EXPONENT
-c CIPHERTEXT, --ciphertext CIPHERTEXT
-n MODULUS, --modulus MODULUS
check_padding is a function that takes integer as input and returns if the decrypted integer is PKCS1.5 conforming.