KishanBagaria / padding-oracle-attackerLinks
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
☆220Updated 2 years ago
Alternatives and similar repositories for padding-oracle-attacker
Users that are interested in padding-oracle-attacker are comparing it to the libraries listed below
Sorting:
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆203Updated 6 years ago
- A cheat sheet for attacking SQLite via SQLi☆102Updated 9 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆211Updated 5 years ago
- A natural evolution of Burp Suite's Repeater tool☆200Updated last year
- Linux privilege escalation via LXD☆141Updated 5 years ago
- notes and code on past CTFs☆105Updated 4 years ago
- Linux post exploitation privilege escalation enumeration☆258Updated 5 years ago
- CLI tool for PKCS7 padding oracle attacks☆142Updated 4 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- ☆148Updated 3 years ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆129Updated 8 months ago
- research☆152Updated last year
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆80Updated 3 months ago
- Piper Burp Suite Extender plugin☆127Updated last week
- DupeKeyInjector☆135Updated 3 years ago
- Words list generator to crack security tokens☆111Updated 5 years ago
- d(ockerp)wn - a docker pwn tool manager☆156Updated 4 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆139Updated last year
- Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.☆178Updated 4 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆206Updated 2 years ago
- HTTP.ninja☆151Updated 2 years ago
- Evenly distributes scanner load across targets☆92Updated 9 months ago
- Everything you need about Burp Extension Generation☆157Updated 3 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆264Updated 2 years ago
- vulnerable single sign on☆150Updated last year
- ☆112Updated last year
- ☆266Updated 6 years ago
- ☆51Updated 5 years ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competition☆102Updated 5 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆129Updated 3 years ago