ackul / CrimeCheckLinks
The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and can reveal to an attacker sensitive information being passed inside an encrypted SSL tunnel such as authentication cookies. This is a python based tool to check if the Web Server is vulnerable to compression bas…
☆17Updated 11 years ago
Alternatives and similar repositories for CrimeCheck
Users that are interested in CrimeCheck are comparing it to the libraries listed below
Sorting:
- Provides access to libhashcat☆31Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated this week
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 7 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated 2 years ago
- A simple yet beautiful phishing proxy.☆58Updated 4 years ago
- wordlists for password cracking☆28Updated 3 years ago
- A rogue DNS detector☆24Updated last month
- Pure Honeypots with an automated bash script☆20Updated 4 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- HoneyDB Python Module☆14Updated last year
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 11 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- ☆15Updated 4 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago