A Proof of Concept for the POODLE vulnerability in SSLv3
☆78Oct 9, 2015Updated 10 years ago
Alternatives and similar repositories for poodle
Users that are interested in poodle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- PoC implementation of the POODLE attack☆69May 13, 2015Updated 10 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆263Oct 6, 2023Updated 2 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Python requirements.txt parser☆14Feb 13, 2015Updated 11 years ago
- Windows kernel vulnerability in win32k.sys Driver☆35Dec 6, 2015Updated 10 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2016-3141☆15Apr 23, 2016Updated 9 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Malware analysis using Docker project☆25Mar 3, 2016Updated 10 years ago
- The Network File Extractor☆11Feb 27, 2014Updated 12 years ago
- Proof of Concept code for CVE-2015-0345 (APSB15-07)☆22Jun 12, 2015Updated 10 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- ☆23Nov 18, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- xosVer Get remote host os version info☆14Aug 20, 2015Updated 10 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆53Aug 5, 2013Updated 12 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- A collection of publicly released whitepapers☆49Sep 1, 2017Updated 8 years ago
- Hide JavaScript inside your GIF and BMP images☆28Aug 23, 2015Updated 10 years ago
- ssh key exchange layer for scapy☆13Oct 27, 2014Updated 11 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40May 3, 2014Updated 11 years ago
- finals-2014☆20Nov 15, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- ☆12Dec 16, 2016Updated 9 years ago
- Drag and Drop ClickJacking PoC development assistance tool.☆196Oct 1, 2020Updated 5 years ago
- 🌌 Go-Observe: A command line Mozilla Observatory client written in Go☆12Feb 9, 2017Updated 9 years ago
- Verification tools for CVE-2016-1287☆33Mar 15, 2017Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Mar 23, 2016Updated 10 years ago
- HMAC timing attack's w/ statistical analysis☆23Sep 19, 2013Updated 12 years ago
- CVE-2018-4330 POC for iOS☆17Sep 13, 2018Updated 7 years ago
- Recover event log entries from an image by heurisitically looking for record structures.☆26Oct 9, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆166May 19, 2023Updated 2 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Oct 17, 2016Updated 9 years ago
- Pack required dlls into a single binary that has no imports and makes direct syscalls on Windows☆28Jul 14, 2017Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Interactive Javascript (SVG|VML) Charting Library☆11Jun 14, 2015Updated 10 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Aug 28, 2013Updated 12 years ago