The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and can reveal to an attacker sensitive information being passed inside an encrypted SSL tunnel such as authentication cookies. This is a python based tool to check if the Web Server is vulnerable to compression bas…
☆17Dec 29, 2013Updated 12 years ago
Alternatives and similar repositories for CrimeCheck
Users that are interested in CrimeCheck are comparing it to the libraries listed below
Sorting:
- CRIME attack PoC : a compression oracle attacks CVE-2012-4929☆30Mar 23, 2019Updated 6 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Attack Surface Mapper is a reconnaissance tool that uses a mixture of open source intellgence and active techniques to expand the attack …☆18Apr 8, 2024Updated last year
- Frictionless integration between Google Drive and Discord, as a service. Send webhook notifications to discord, from google drive, when a…☆12Jan 9, 2021Updated 5 years ago
- This is a Google drive URl shortner like program which helps you to share your google drive file with out exceeding the quota and anonymo…☆20Jan 25, 2020Updated 6 years ago
- Pure Rust PNG decoder with good performances in WebAssembly☆10Aug 13, 2019Updated 6 years ago
- Catalog of security breaches☆24Mar 15, 2025Updated last year
- A basic -- but hopefully realistic -- pynvim rplugin example for demonstration / documentation purpose☆11Dec 10, 2022Updated 3 years ago
- WEFTools☆14Apr 30, 2020Updated 5 years ago
- Template dApp to start building with the Enigma Protocol☆12Dec 24, 2018Updated 7 years ago
- A tool for anonymizing webserver logs☆15Apr 23, 2017Updated 8 years ago
- Leakedsource like "Data Breach Search Engine" with cool Material UI☆22Jan 28, 2019Updated 7 years ago
- A repository of data around arrests on BART☆14Nov 8, 2018Updated 7 years ago
- Python tool to detect critical information (passwords, usernames, strings connectios, etc) in public repositories. GITHUB Hacking.☆22Jan 10, 2022Updated 4 years ago
- ⚖️ R code to scrape the DoJ Capitol Breach Cases and daily data files of said scraped info via GH actions☆24Nov 6, 2024Updated last year
- Ephemeral, self-destructing, optionally in-browser, end-to-end encrypted chat rooms☆14Jul 18, 2017Updated 8 years ago
- Fork of babel-plugin-rewire with TypeScript compatibility☆11Aug 18, 2020Updated 5 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- Additional Resources to improve Customer Experience with Azure Advanced Threat Protection☆22Jun 12, 2023Updated 2 years ago
- Sign-in a user with the Microsoft Identity Platform and call an ASP.NET web API that calls a downstream Web API with Conditional Access☆16Jan 6, 2023Updated 3 years ago
- Epimitheus is a tool that uses graphical database Neo4j for Windows Events visualization.☆19Mar 13, 2022Updated 4 years ago
- An NPM module to reinstall missing dependencies.☆56Sep 6, 2015Updated 10 years ago
- ssd-l10n☆10Dec 9, 2016Updated 9 years ago
- ☆11Aug 18, 2021Updated 4 years ago
- Gnome shell extension that snaps window to it's neighbors☆16Jan 24, 2019Updated 7 years ago
- A means of archving the files that were leaked on Wikileaks as a backup. These are downloaded to the best of my abilities to try and coll…☆38Jan 10, 2024Updated 2 years ago
- The cgo.wchar package is to be used with go/cgo and helps with the conversion from and to C.wchar_t and wchar_t strings (*C.wchar_t with …☆14Jun 29, 2015Updated 10 years ago
- This extension simplifies the use of the video recording function integrated in gnome shell, allows quickly to change the various setting…☆14Nov 25, 2020Updated 5 years ago
- Hardware for Nitrokey FIDO U2F☆10May 22, 2019Updated 6 years ago
- INACTIVE - http://mzl.la/ghe-archive - A small script that can act as a trust root for installing pip 8☆20Apr 19, 2019Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Apr 10, 2019Updated 6 years ago
- Radware Ansible Collection☆10Sep 27, 2023Updated 2 years ago
- A running collection of resources for people who want to get started in machine learning and data science☆18Dec 22, 2016Updated 9 years ago
- Library for scraping Strava data☆18May 24, 2021Updated 4 years ago
- Create CRX3 files without Chrome, extract public keys, verify signatures; cli & api☆22May 26, 2023Updated 2 years ago
- Services called by the CCADB Salesforce instance to perform specific tasks☆18Jan 28, 2026Updated last month
- Showcase of Privacy-Preserving Smart Contracts using Enigma☆18Nov 20, 2018Updated 7 years ago
- ☆20May 15, 2018Updated 7 years ago