ackul / CrimeCheckLinks
The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and can reveal to an attacker sensitive information being passed inside an encrypted SSL tunnel such as authentication cookies. This is a python based tool to check if the Web Server is vulnerable to compression bas…
☆17Updated 12 years ago
Alternatives and similar repositories for CrimeCheck
Users that are interested in CrimeCheck are comparing it to the libraries listed below
Sorting:
- Clean public password dump files and store in ELK☆37Updated 8 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 11 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated last week
- Provides access to libhashcat☆31Updated last year
- A rogue DNS detector☆24Updated 2 months ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Updated 4 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆21Updated 9 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆56Updated 3 years ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- LetMeOutOfYour.net Resources☆21Updated 5 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Microsoft Flow Attack Framework☆23Updated 6 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- My Python Cookiecutter project template☆32Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Bunch of honey related items that spoof/decoy powersploit functions.☆18Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 5 years ago
- Automated 802.1x Bypass☆87Updated 5 years ago
- POC for utilizing wikipedia API for Command and Control☆29Updated 3 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 2 weeks ago