Ayrx / tlsenum
A command line tool to enumerate TLS cipher-suites supported by a server
☆34Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for tlsenum
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 10 years ago
- ☆26Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 5 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- ☆23Updated 9 years ago
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 7 years ago
- Parallel APK analyzer☆51Updated 7 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.☆48Updated 7 years ago
- A tool for netpens.☆29Updated 5 years ago
- ☆32Updated 9 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 7 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 5 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆17Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆28Updated 10 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- Searches for interesting cached DNS entries.☆55Updated 10 years ago
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆43Updated 8 years ago
- yara rules for crypto detection☆30Updated 10 years ago
- Script to find exploitable magic methods for PHP object injection☆27Updated 9 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago
- Flash crossdomain policy security checker☆25Updated 9 years ago