Hi all,
Sorry for "disappearing" for 1 year.
Recently I got bored with f**king calculus practice and decided to abuse some machines to factor the RSA key, and...
const unsigned char PRIV_KEY_D[KEY_BYTESIZE] = {
0x34, 0x78, 0x84, 0xF1, 0x64, 0x41, 0x22, 0xAC, 0xE5, 0x12, 0xE6, 0x49, 0x15, 0x96, 0xC3, 0xE4,
0xBA, 0xD0, 0x44, 0xB0, 0x87, 0x3E, 0xCE, 0xE5, 0x52, 0x81, 0x2D, 0x5A, 0x7D, 0x7E, 0x0C, 0x75,
0x6A, 0x96, 0x7C, 0xE7, 0x5F, 0xDF, 0x7A, 0x21, 0x86, 0x40, 0x5B, 0x10, 0x43, 0xFD, 0x47, 0xDA,
0x7B, 0xA7, 0xA4, 0xAC, 0x89, 0x20, 0xA6, 0x93, 0x91, 0x1C, 0x63, 0x5A, 0x83, 0x8E, 0x08, 0x01
}; // for 279.96 * 8 core hours.
http://puu.sh/9AHRL/2e5200f9bb.zip@brliron now you don't need to repack th135.pak just for those stupid encrypted file lists, enjoy