Closed ThewsyRum closed 2 hours ago
What was your implementation to obtain the private key by exploiting these vulnerabilities? Can you reach out to me?
There was no implementation to recover the private key in this code. it only detects vulnerabilities.
What was your implementation to obtain the private key by exploiting these vulnerabilities? Can you reach out to me?