ackul / CrimeCheckLinks
The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and can reveal to an attacker sensitive information being passed inside an encrypted SSL tunnel such as authentication cookies. This is a python based tool to check if the Web Server is vulnerable to compression bas…
☆17Updated 11 years ago
Alternatives and similar repositories for CrimeCheck
Users that are interested in CrimeCheck are comparing it to the libraries listed below
Sorting:
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆46Updated last month
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Ansible scripts to build an attack box☆24Updated 7 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- Provides access to libhashcat☆31Updated last year
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- Automated install process for Phishing Frenzy☆23Updated 10 years ago
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- A simple yet beautiful phishing proxy.☆57Updated 4 years ago
- Clean public password dump files and store in ELK☆38Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- wordlists for password cracking☆28Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆62Updated 7 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆28Updated 6 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 7 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago