KishanBagaria / padding-oracle-attackerLinks
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
☆210Updated 2 years ago
Alternatives and similar repositories for padding-oracle-attacker
Users that are interested in padding-oracle-attacker are comparing it to the libraries listed below
Sorting:
- Linux privilege escalation via LXD☆138Updated 5 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆202Updated 6 years ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆127Updated 3 months ago
- A natural evolution of Burp Suite's Repeater tool☆199Updated last year
- research☆151Updated last year
- CLI tool for PKCS7 padding oracle attacks☆139Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- DupeKeyInjector☆135Updated 3 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- Padding oracle attack against PKCS7☆335Updated 2 years ago
- Linux post exploitation privilege escalation enumeration☆258Updated 5 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆263Updated 3 years ago
- Everything you need about Burp Extension Generation☆156Updated 2 years ago
- Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.☆178Updated 3 years ago
- Evenly distributes scanner load across targets☆92Updated 4 months ago
- ☆148Updated 3 years ago
- SOCKS5 and HTTP over TURN/STUN proxy☆181Updated last year
- The request.bin of DNS request☆235Updated 7 years ago
- ☆50Updated 5 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆78Updated 6 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆258Updated last year
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- notes and code on past CTFs☆102Updated 4 years ago
- Simple python script to extract unsafe functions from php projects☆200Updated 7 years ago
- Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )☆32Updated 5 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆349Updated 2 years ago
- CVE-2019-19781 - Remote Code Execution on Citrix ADC Netscaler exploit☆157Updated 4 years ago