ackul / CrimeCheckLinks
The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and can reveal to an attacker sensitive information being passed inside an encrypted SSL tunnel such as authentication cookies. This is a python based tool to check if the Web Server is vulnerable to compression bas…
☆17Updated 12 years ago
Alternatives and similar repositories for CrimeCheck
Users that are interested in CrimeCheck are comparing it to the libraries listed below
Sorting:
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- Provides access to libhashcat☆31Updated last year
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Updated 4 years ago
- ☆15Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- Follow all members of a list☆12Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated 2 years ago
- Various scripts and codes☆84Updated 4 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 4 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Updated 2 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- ☆33Updated 7 years ago
- This is a collection of Security Baselines that I use in my virtual lab environment.☆22Updated 5 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- wordlists for password cracking☆28Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆77Updated last year
- Microsoft Flow Attack Framework☆23Updated 6 years ago
- Rust-based password mutator for brute force attacks☆13Updated 9 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated 2 years ago