KishanBagaria / padding-oracle-attackerLinks
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
☆208Updated 2 years ago
Alternatives and similar repositories for padding-oracle-attacker
Users that are interested in padding-oracle-attacker are comparing it to the libraries listed below
Sorting:
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆201Updated 6 years ago
- notes and code on past CTFs☆103Updated 4 years ago
- A toolbox for extracting RSA private keys from public keys.☆184Updated 3 years ago
- Script to recover mt_rand()'s seed with only two outputs and without any bruteforce.☆153Updated 5 years ago
- CLI tool for PKCS7 padding oracle attacks☆137Updated 4 years ago
- ☆265Updated 6 years ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆98Updated 2 years ago
- Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.☆178Updated 3 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- SOCKS5 and HTTP over TURN/STUN proxy☆180Updated last year
- ☆111Updated 3 years ago
- HTTP.ninja☆151Updated last year
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆601Updated 4 years ago
- Everything you need about Burp Extension Generation☆154Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- DNS rebinding toolkit☆253Updated 2 years ago
- A natural evolution of Burp Suite's Repeater tool☆199Updated last year
- ☆98Updated 7 months ago
- Predict Mongo ObjectIds☆136Updated 7 years ago
- Automatic exploit generation for simple linux pwn challenges.☆322Updated 2 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆348Updated 2 years ago
- Blazing fast, advanced Padding Oracle exploit☆254Updated last year
- Linux privilege escalation via LXD☆134Updated 5 years ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆126Updated last month
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆203Updated 2 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- XS-Leak Browser Test Suite☆81Updated last year
- Burp with Friends☆103Updated 2 years ago
- DupeKeyInjector☆135Updated 3 years ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆434Updated 2 years ago