Cracker for Apache.lang.commons RandomStringUtils(). Code for "The Java Soothsayer" talk at EkoParty 2017 by Alejo Popovici.
☆33Mar 13, 2018Updated 7 years ago
Alternatives and similar repositories for randomstringutils
Users that are interested in randomstringutils are comparing it to the libraries listed below
Sorting:
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- An intercepting proxy, based on Netty☆19Sep 14, 2017Updated 8 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Primitive tool for exploring/querying Java classes via the Tinkerpop Gremlin graph traversal language☆110May 12, 2016Updated 9 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- Tool for reconnaissance of AWS cloud environments☆16Oct 9, 2023Updated 2 years ago
- ☆34Aug 13, 2021Updated 4 years ago
- libsodium for Universal Windows Platform (UWP) - A secure cryptographic library☆16Jun 24, 2018Updated 7 years ago
- Two Proof-Of-Concepts of SUID binary vulnerabilities on BMC Patrol allowing to elevate privileges from any linux user to root.☆12Jun 29, 2020Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆65Oct 21, 2019Updated 6 years ago
- ☆17Dec 1, 2019Updated 6 years ago
- ☆14Apr 23, 2019Updated 6 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆103Aug 22, 2019Updated 6 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆65Oct 25, 2016Updated 9 years ago
- ☆17Sep 14, 2017Updated 8 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆120Apr 26, 2021Updated 4 years ago
- An interactive way to learn threat modeling☆17Feb 14, 2019Updated 7 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Sep 1, 2018Updated 7 years ago
- Repository containing many useful scripts☆75Mar 30, 2022Updated 3 years ago
- ☆41May 16, 2018Updated 7 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- Ransomware base in Java for all operating systems☆19Jun 13, 2017Updated 8 years ago
- A tool to investigate Dependency Confusion in Artifactory☆24May 15, 2025Updated 9 months ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Simple shell scripts for DNS and DNSSEC monitoring☆18Apr 25, 2022Updated 3 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- My solutions to the Matasano Crypto Challenges. Written as a project for learning python.☆34Aug 8, 2014Updated 11 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Mar 23, 2020Updated 5 years ago
- DupeKeyInjector☆134Apr 16, 2022Updated 3 years ago
- Javascript Code Injection for Debugging☆20Nov 11, 2023Updated 2 years ago