SafeBreach-Labs / cachetalk
Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching
☆34Updated 7 years ago
Alternatives and similar repositories for cachetalk:
Users that are interested in cachetalk are comparing it to the libraries listed below
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- ☆27Updated 7 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- Security tools to use on assessments.☆39Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 8 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- Vulnerable Grails application☆43Updated 9 years ago
- Malware analysis using Docker project☆25Updated 8 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 7 years ago
- PFI (Port Forwarding Interceptor)☆46Updated 15 years ago
- Materials for 44con 2014 CANAPE Workshop☆22Updated 10 years ago
- Websocket based egress tester☆20Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- Resources for: "Playing games with an attacker: how I messed with someone trying to breach the CryptoWall tracker"☆24Updated 8 years ago
- ☆12Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 9 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 7 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- ☆45Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 6 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆44Updated 9 years ago
- A command line Hash Identifying tool.☆101Updated 5 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13Updated 8 years ago
- A collection of scripts made duing my personal research☆28Updated 6 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- ☆17Updated 10 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago