The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and can reveal to an attacker sensitive information being passed inside an encrypted SSL tunnel such as authentication cookies. This is a python based tool to check if the Web Server is vulnerable to compression bas…
☆17Dec 29, 2013Updated 12 years ago
Alternatives and similar repositories for CrimeCheck
Users that are interested in CrimeCheck are comparing it to the libraries listed below
Sorting:
- CRIME attack PoC : a compression oracle attacks CVE-2012-4929☆30Mar 23, 2019Updated 6 years ago
- Universal Plug and Fuzz☆41Sep 16, 2019Updated 6 years ago
- Tools to work with the pwnedkeys.com API☆10Dec 20, 2018Updated 7 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- ☆11Jul 10, 2024Updated last year
- Radware Ansible Collection☆10Sep 27, 2023Updated 2 years ago
- black Ip lists, dorks-collection☆16Feb 1, 2026Updated 3 weeks ago
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- A basic -- but hopefully realistic -- pynvim rplugin example for demonstration / documentation purpose☆10Dec 10, 2022Updated 3 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- Pure Rust PNG decoder with good performances in WebAssembly☆10Aug 13, 2019Updated 6 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- Binary and Static Releases☆16Feb 20, 2026Updated last week
- ☆12Sep 18, 2015Updated 10 years ago
- The cgo.wchar package is to be used with go/cgo and helps with the conversion from and to C.wchar_t and wchar_t strings (*C.wchar_t with …☆14Jun 29, 2015Updated 10 years ago
- Source code of https://torstatus.rueckgr.at☆10Jan 14, 2026Updated last month
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- Some ELF Malwares☆10Mar 11, 2022Updated 3 years ago
- Template dApp to start building with the Enigma Protocol☆12Dec 24, 2018Updated 7 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- ☆13Dec 28, 2024Updated last year
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- This is a collection of known malware and threats found on various Linux/web servers. Also find known ways to detect☆12Aug 1, 2020Updated 5 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- to show all hidden EFIs and any APFS subvolumes☆11Jul 5, 2021Updated 4 years ago
- ALL IN ONE Hacking Tool For Hackers☆10Dec 12, 2020Updated 5 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- A tool to find/download malware samples from various public repositories☆12Dec 22, 2021Updated 4 years ago
- Services called by the CCADB Salesforce instance to perform specific tasks☆18Jan 28, 2026Updated last month
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Hardware for Nitrokey FIDO U2F☆10May 22, 2019Updated 6 years ago
- Script to give overview of an Operating System☆12Jun 1, 2025Updated 8 months ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- MMM-OpenWeather24Hours is a 3rd party module for MagicMirror that shows weather information for the next 24 hours. The weather data is ta…☆11Apr 21, 2024Updated last year