FiloSottile / Badfish
☆12Updated this week
Related projects: ⓘ
- ☆29Updated this week
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 8 years ago
- Data package with attacks against civil society☆13Updated 8 years ago
- ☆30Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Satellite: Measuring The Internet's Stars☆37Updated 4 years ago
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- ☆12Updated 7 years ago
- A Volatility plugin to extract credentials from the memory of a OpenVPN client.☆29Updated 9 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆59Updated 5 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- Simple script for PGP encrypted newsletter☆26Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆46Updated 6 years ago
- ☆18Updated this week
- Tools for attacking cryptographic implementations.☆21Updated 7 years ago
- Email Abuse - A Versatile Software for Email review, analysis and reporting☆20Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- Stochastic Traffic Factoring Utility☆14Updated 7 years ago
- Prangster tool from the Black Hat USA 2013 presentation "Black-Box Assessment of Pseudorandom Algorithms" by Derek Soeder, Christopher Ab…☆10Updated 10 years ago
- IRMA frontend☆25Updated 7 years ago
- ☆30Updated this week
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Parallel APK analyzer☆51Updated 7 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Quantum Insert/FoxAcid case study☆15Updated 7 years ago
- Script to scan sites for images containing embedded EXIF metadata☆13Updated 11 years ago
- One-pass MAC spoofer for multiple devices (based on libmacouflage).☆16Updated 7 years ago
- Host files with DNS☆32Updated 8 years ago