TLS Redirection
☆118Nov 21, 2017Updated 8 years ago
Alternatives and similar repositories for TLS-Redirection
Users that are interested in TLS-Redirection are comparing it to the libraries listed below
Sorting:
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆295Jan 15, 2025Updated last year
- ☆72Nov 20, 2017Updated 8 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- A search engine for content shared publicly via cloud storage services☆103Jun 17, 2024Updated last year
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- Place for random PoCs☆18May 21, 2020Updated 5 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆123Nov 30, 2017Updated 8 years ago
- GUI tool to create ROP chains using the ropper API☆159Mar 30, 2018Updated 7 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Jun 19, 2018Updated 7 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- Main repository to pull all Cisco related projects.☆16Sep 21, 2017Updated 8 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Burp extension☆58Jun 18, 2018Updated 7 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Nov 25, 2021Updated 4 years ago
- Linux Memory Cryptographic Keys Extractor☆240May 22, 2023Updated 2 years ago
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆52Oct 28, 2025Updated 4 months ago
- exploit for ImageMagick's uninitialized memory disclosure in gif coder☆284Jul 22, 2017Updated 8 years ago
- HTTP.ninja☆148Sep 3, 2023Updated 2 years ago
- A Python3 based single-file subdomain enumerator☆90Oct 5, 2019Updated 6 years ago
- ☆33Nov 14, 2025Updated 3 months ago
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆584Sep 7, 2021Updated 4 years ago
- A collection of scripts to extend Burp Suite☆142Apr 8, 2019Updated 6 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆161Feb 2, 2023Updated 3 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,068Apr 26, 2020Updated 5 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆404Mar 3, 2024Updated last year
- Uses viewdns.info to perform a reverse NS lookup on a specified nameserver and attempts zone transfers on discovered domains☆19May 2, 2019Updated 6 years ago
- Cgiemail - Source Code Disclosure/LFI☆16Oct 21, 2016Updated 9 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,164May 26, 2023Updated 2 years ago
- Nail in the JKS coffin - Cracking passwords of private key entries in a JKS file☆189Sep 21, 2020Updated 5 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- Stealing CSRF tokens with CSS injection (without iFrames)☆322Feb 7, 2018Updated 8 years ago
- X41 Browser Security White Paper - Tools and PoCs☆183Sep 29, 2017Updated 8 years ago
- Presentations in different conferences☆37Oct 17, 2019Updated 6 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago