LibreSSL with a backdoor in RSA key generation
☆17Jun 26, 2016Updated 9 years ago
Alternatives and similar repositories for libressl-RSA-backdoor
Users that are interested in libressl-RSA-backdoor are comparing it to the libraries listed below
Sorting:
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Tools to work with vulnerability standards.☆19Mar 19, 2014Updated 11 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- Mirror of freehaven's anonymous research bibliography☆14Feb 10, 2015Updated 11 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- `wash` is a framework for creating and interfacing with trojans that can establish a "web shell" on a compromised web server. It is desig…☆31Nov 7, 2016Updated 9 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- BitTorrent Tracker with upload & browsing, written on the 25th Chaos Communication Congress☆33Dec 25, 2013Updated 12 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- source code and binaries related to my trainings☆20Oct 18, 2016Updated 9 years ago
- A RAT (Remote Administration Tool) using port-knocking techniques for *NIX systems I wrote in 2006 but still works in 2017. libpcap-based…☆49May 3, 2017Updated 8 years ago
- android kernel disassembler based on MAME emulator code☆39Nov 26, 2013Updated 12 years ago
- timing attack to check if devtools are open☆52May 6, 2016Updated 9 years ago
- A scoreboard for Security CTF events☆37Dec 11, 2012Updated 13 years ago
- A complete Ruby porting of the ubertooth libraries and utilities.☆22Nov 16, 2015Updated 10 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Oct 24, 2016Updated 9 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- A dumb script for finding dumb coding errors in WordPress plugins☆53Jun 15, 2022Updated 3 years ago
- Talk given at DerbyCon and RuxCon 2016☆23Sep 23, 2016Updated 9 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- OpenSSH remote DOS exploit and vulnerable container☆53Oct 30, 2017Updated 8 years ago
- Flash crossdomain policy security checker☆26Oct 3, 2015Updated 10 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- A security scanner for Wordpress blogging engine☆32May 11, 2016Updated 9 years ago
- A http/https, socks proxy server, a mitm server and a ssocks server with rules☆26Mar 25, 2019Updated 6 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Dec 21, 2015Updated 10 years ago
- Easy to use command line security scanner☆58Feb 27, 2016Updated 10 years ago
- Dexter v2 - Point of Sales Trojan☆26Feb 25, 2015Updated 11 years ago
- ☆29Apr 28, 2017Updated 8 years ago
- A web spider for shodan.io without using the Developer API.☆33Jan 4, 2018Updated 8 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Building optimized shellcode using GCC. Suited for learning assembly and playing with the ABI☆78May 16, 2018Updated 7 years ago
- A Python tool to generate ROP chains☆65Feb 1, 2025Updated last year