ackul / CrimeCheckLinks
The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and can reveal to an attacker sensitive information being passed inside an encrypted SSL tunnel such as authentication cookies. This is a python based tool to check if the Web Server is vulnerable to compression bas…
☆17Updated 12 years ago
Alternatives and similar repositories for CrimeCheck
Users that are interested in CrimeCheck are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Provides access to libhashcat☆31Updated last year
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆65Updated 5 years ago
- wordlists for password cracking☆28Updated 3 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated 2 weeks ago
- Pure Honeypots with an automated bash script☆21Updated 4 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Standardizing Security Titles☆13Updated last month
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 4 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 11 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Updated 4 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated last week
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 5 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Updated 4 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 4 years ago
- ☆15Updated 4 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆56Updated 3 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- ☆33Updated last year
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 6 years ago
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- Haschcat Rules processor☆14Updated 2 years ago
- HoneyDB Python Module☆14Updated 2 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago