ChrisMcMStone / SpinnerLinks
A tool for automatic black-box detection of missing hostname verification, including for applications that use certificate pinning.
☆19Updated 6 years ago
Alternatives and similar repositories for Spinner
Users that are interested in Spinner are comparing it to the libraries listed below
Sorting:
- Parallel APK analyzer☆51Updated 8 years ago
- REST/JSON interface to Burp Suite☆33Updated 5 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆54Updated 4 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- A fuzzing script for MitmProxy☆24Updated 10 years ago
- This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.☆25Updated 2 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- Deliberately vulnerable web application☆22Updated 8 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆76Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆15Updated 2 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- Office 365 MFA capture toolkit☆14Updated 8 years ago
- Repoguard is a simple tool to check and alert on interesting changes in a git repository.☆48Updated 8 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32Updated 13 years ago
- Material from our CANAPE workshop☆32Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- SMB Auto authentication Vulnerability☆34Updated 9 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Websocket based egress tester☆20Updated 9 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- ☆32Updated 10 years ago
- Git Web Hook Tunnel for C2☆28Updated 2 years ago
- A tool for calculating necessary SQL Server permissions☆24Updated 10 years ago