pollard_p_1
attack by running python RsaCtfTool.py --uncipher [c] -e 65537 -n [n] --attack pollard_p_1
doesn't work since it doesn't try enough primes (relevant source code). So, we adapt their script to create the solution script.py, which tries 7000 primes.factordb
attack.picoCTF{376ebfe7}