KishanBagaria / padding-oracle-attackerLinks
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
☆210Updated 2 years ago
Alternatives and similar repositories for padding-oracle-attacker
Users that are interested in padding-oracle-attacker are comparing it to the libraries listed below
Sorting:
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆202Updated 6 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- A natural evolution of Burp Suite's Repeater tool☆199Updated last year
- DupeKeyInjector☆135Updated 3 years ago
- ☆148Updated 3 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- research☆151Updated last year
- Piper Burp Suite Extender plugin☆126Updated last year
- Everything you need about Burp Extension Generation☆156Updated 2 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆263Updated 3 years ago
- notes and code on past CTFs☆102Updated 4 years ago
- SHELLING - a comprehensive OS command injection payload generator☆111Updated 6 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- HTTP.ninja☆151Updated 2 years ago
- CLI tool for PKCS7 padding oracle attacks☆140Updated 4 years ago
- Evenly distributes scanner load across targets☆92Updated 5 months ago
- ☆50Updated 5 years ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆128Updated 4 months ago
- Linux privilege escalation via LXD☆139Updated 5 years ago
- ☆106Updated 10 months ago
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- Proof of concept for CVE-2020-5902☆72Updated 5 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆106Updated 2 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- The request.bin of DNS request☆236Updated 7 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )☆32Updated 5 years ago
- Predict Mongo ObjectIds☆145Updated 7 years ago
- Simple python script to extract unsafe functions from php projects☆197Updated 7 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆122Updated 6 years ago