ackul / CrimeCheckLinks
The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and can reveal to an attacker sensitive information being passed inside an encrypted SSL tunnel such as authentication cookies. This is a python based tool to check if the Web Server is vulnerable to compression bas…
☆17Updated 11 years ago
Alternatives and similar repositories for CrimeCheck
Users that are interested in CrimeCheck are comparing it to the libraries listed below
Sorting:
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆45Updated this week
- A collection of tools adversaries commonly use in an attack.☆14Updated 9 months ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- Forensics triage tool relying on Volatility and Foremost☆26Updated last year
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- ☆15Updated 3 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- HoneyDB Python Module☆13Updated last year
- A Darktrace CLI written in Python☆16Updated 5 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Microsoft Flow Attack Framework☆23Updated 5 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Provides access to libhashcat☆30Updated last year
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Custom scripts used during the scenario☆21Updated 4 years ago
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Simple tool to extract the most common substrings from an input text. Built for password cracking.☆66Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- A tool for simplifying the process of researching IOCs.☆25Updated 3 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated 11 months ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 7 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago