SafeBreach-Labs / cachetalk
Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching
☆35Updated 7 years ago
Alternatives and similar repositories for cachetalk:
Users that are interested in cachetalk are comparing it to the libraries listed below
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- ☆27Updated 7 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Vulnerable Grails application☆43Updated 9 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Security tools to use on assessments.☆39Updated 8 years ago
- ☆26Updated 8 years ago
- Malware analysis using Docker project☆25Updated 9 years ago
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- Botnet monitoring is a crucial part in threat analysis and often neglected due to the lack of proper open source tools. Our tool will pro…☆81Updated 11 years ago
- Simple reverse ICMP shell☆41Updated 11 years ago
- like hidden-tear with libsodium☆20Updated 9 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Materials for 44con 2014 CANAPE Workshop☆23Updated 10 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Password guessers for popular vulnerability scanners and frameworks: Find the password for your favourite vulnscanners: OpenVAS, Nessus, …☆31Updated 12 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- VPS infrastructure found in HT dumps☆26Updated 9 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- A free and open source command-line shell and scripting language designed especially for security testing☆127Updated 11 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- ☆12Updated 7 years ago