SafeBreach-Labs / cachetalkLinks
Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching
☆38Updated 8 years ago
Alternatives and similar repositories for cachetalk
Users that are interested in cachetalk are comparing it to the libraries listed below
Sorting:
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- like hidden-tear with libsodium☆20Updated 10 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- A reverse socks5 proxy server and client☆18Updated 8 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- Data exfiltration PoC scripts☆25Updated 10 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 10 years ago
- Security tools to use on assessments.☆40Updated 9 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆61Updated 8 years ago
- POC for IAT Parsing Payloads☆48Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Vulnerable Grails application☆43Updated 10 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 9 years ago