ackul / CrimeCheckLinks
The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and can reveal to an attacker sensitive information being passed inside an encrypted SSL tunnel such as authentication cookies. This is a python based tool to check if the Web Server is vulnerable to compression bas…
☆17Updated 11 years ago
Alternatives and similar repositories for CrimeCheck
Users that are interested in CrimeCheck are comparing it to the libraries listed below
Sorting:
- Provides access to libhashcat☆30Updated last year
- A collection of tools adversaries commonly use in an attack.☆14Updated 8 months ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 6 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 8 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 8 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆45Updated last month
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- HoneyDB Python Module☆13Updated last year
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆52Updated 4 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- ☆30Updated 7 years ago
- Generate HTTPS reports based on scan data☆15Updated 3 weeks ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago