Pure python, SSL/TLS protocol and cipher scanner/enumerator.
☆27Jun 16, 2025Updated 8 months ago
Alternatives and similar repositories for TLScan
Users that are interested in TLScan are comparing it to the libraries listed below
Sorting:
- Exploits, Fuzzers, Scripts etc☆35Dec 30, 2025Updated 2 months ago
- Script for easily importing a trusted CA certificate into the iOS Simulator's trust store. This provides application testers the ability …☆48Aug 8, 2011Updated 14 years ago
- Insiderer looks inside files for metadata and hidden content☆37May 11, 2015Updated 10 years ago
- Client for Tidas (iOS)☆17Jun 22, 2016Updated 9 years ago
- ☆19Feb 21, 2015Updated 11 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- a MITM attack tool☆85Sep 9, 2015Updated 10 years ago
- Scripts to create your own MITM'ing, packet sniffing WiFi access point☆149Aug 21, 2015Updated 10 years ago
- Small tool for disassembling shellcode (using objdump)☆149Jun 19, 2022Updated 3 years ago
- Parse HTTP Security Headers☆40Sep 12, 2024Updated last year
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- Tools developed to test the Redirect to SMB issue☆84Jun 2, 2015Updated 10 years ago
- RemoteBridge is a library that allows you to access internal COM and JAVA objects used by third-party applications remotely.☆35Oct 11, 2017Updated 8 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Impacket is a collection of Python classes for working with network protocols.☆38Oct 13, 2021Updated 4 years ago
- Android based APT exploitation framework☆36Jul 20, 2015Updated 10 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Aug 15, 2016Updated 9 years ago
- Malware Fragmentation Tool its a tool that simply fragment the PE file and it can disassemble the PE file, etc this tool very useful for…☆37Nov 22, 2015Updated 10 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated 3 weeks ago
- Obtain emails using the LinkedIn Graph API☆11Oct 1, 2025Updated 5 months ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Random UI Fuzzer (Monkey-Fuzzer) for finding bugs in Windows Forms☆10Oct 27, 2019Updated 6 years ago
- Nmap enumeration and script scan automation script☆38Mar 7, 2023Updated 2 years ago
- Proof of concept to test POODLE over TLS☆11Mar 13, 2015Updated 10 years ago
- Examples for using the dedupe library☆10Feb 22, 2016Updated 10 years ago
- A simple ldap object mapper for python☆20Feb 21, 2022Updated 4 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- A LinkedIn Scraper☆15Aug 20, 2018Updated 7 years ago
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- ☆31Nov 13, 2014Updated 11 years ago
- Zeek Profinet I/O Context Manager Parser - CISA ICSNPP☆14Nov 19, 2025Updated 3 months ago
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Quickly and easily test your JS☆14Jul 20, 2014Updated 11 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 7 years ago