KishanBagaria / padding-oracle-attacker
🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.
☆204Updated 2 years ago
Alternatives and similar repositories for padding-oracle-attacker:
Users that are interested in padding-oracle-attacker are comparing it to the libraries listed below
- notes and code on past CTFs☆103Updated 3 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆199Updated 6 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- CLI tool for PKCS7 padding oracle attacks☆135Updated 4 years ago
- A cheat sheet for attacking SQLite via SQLi☆98Updated 8 years ago
- A natural evolution of Burp Suite's Repeater tool☆195Updated last year
- ☆264Updated 6 years ago
- Exporter is a Burp Suite extension to copy a request to a file or the clipboard as multiple programming languages functions.☆176Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Script to recover mt_rand()'s seed with only two outputs and without any bruteforce.☆152Updated 5 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆75Updated 5 years ago
- One stop place for exploiting Jira instances in your proximity☆187Updated 10 months ago
- Multi-threaded Padding Oracle attacks against any service. Written in Rust.☆94Updated 2 years ago
- Everything you need about Burp Extension Generation☆152Updated 2 years ago
- DupeKeyInjector☆135Updated 2 years ago
- Issues with WebSocket reverse proxying allowing to smuggle HTTP requests☆353Updated 7 months ago
- Linux post exploitation privilege escalation enumeration☆256Updated 4 years ago
- ☆147Updated 3 years ago
- Burp extension to detect alias traversal via NGINX misconfiguration at scale.☆258Updated 3 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆134Updated 5 months ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆347Updated 2 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆256Updated last year
- ☆128Updated 4 years ago
- DNS rebinding toolkit☆251Updated last year
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆429Updated 2 years ago
- Words list generator to crack security tokens☆110Updated 4 years ago
- ☆90Updated 6 years ago
- d(ockerp)wn - a docker pwn tool manager☆155Updated 3 years ago
- Exfiltrate blind Remote Code Execution and SQL injection output over DNS via Burp Collaborator.☆266Updated 2 months ago
- Linux privilege escalation via LXD☆133Updated 5 years ago