Ayrx / tlsenum
A command line tool to enumerate TLS cipher-suites supported by a server
☆34Updated 7 years ago
Related projects: ⓘ
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- Cross Distribution Exploit Testing☆27Updated 8 years ago
- collection of python scripts to capture dns traffic and store it in elasticsearch☆8Updated 3 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 7 years ago
- ☆26Updated 7 years ago
- Websocket based egress tester☆20Updated 7 years ago
- Prometheus Firewall Analyzer☆47Updated 9 years ago
- Anti-Honeypot Demo (obsolete)☆18Updated 7 years ago
- ☆16Updated this week
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆28Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Updated 3 years ago
- A tool for netpens.☆29Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 8 years ago
- CVE-2016-2776☆27Updated 7 years ago
- ☆15Updated this week
- ☆28Updated this week
- ☆22Updated this week
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 5 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- ☆12Updated this week
- Transfer Kippo data to ElasticSearch☆18Updated 8 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆37Updated 9 years ago
- ☆27Updated this week
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆17Updated 9 years ago
- A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat☆44Updated 11 years ago
- ☆17Updated this week
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆17Updated 10 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago