Toy version of the sweet32 attack
☆16Nov 24, 2017Updated 8 years ago
Alternatives and similar repositories for sour16
Users that are interested in sour16 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An implementation of the concepts behind the Logjam attack☆16May 1, 2016Updated 9 years ago
- A multithreaded Python3 program that fuzzes HTTP headers and values and outputs the results to a CSV file.☆21Jan 13, 2019Updated 7 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- ☆14Nov 12, 2024Updated last year
- ☆12Jun 8, 2018Updated 7 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11May 12, 2020Updated 5 years ago
- Exploit for Red Hat / GlusterFS CVE-2018-1088 & CVE-2018-1112, featured @ DEFCON 26, Las Vegas!☆10Apr 30, 2020Updated 5 years ago
- Group 14's MDP project☆14Mar 30, 2024Updated last year
- ☆18Mar 16, 2021Updated 5 years ago
- T00ls.Net 2017第一期线下沙龙(北京)PPT合集☆20May 24, 2017Updated 8 years ago
- ☆12Mar 23, 2019Updated 7 years ago
- Wireguard Key Generator, web-based, client-side, trustless☆13Feb 3, 2025Updated last year
- BSidesPDX CTF 2017☆11Dec 7, 2017Updated 8 years ago
- cve-2018-2894 不同别人的利用方法。☆15Dec 1, 2025Updated 3 months ago
- ☆10Aug 25, 2022Updated 3 years ago
- PoC of a protected process causing a blue screen if killed.☆15Jul 31, 2018Updated 7 years ago
- Deobfuscate Babel 8.5's VM☆12Aug 11, 2016Updated 9 years ago
- Installer preseed configurations for Kali Linux☆15Oct 20, 2021Updated 4 years ago
- Yet another no-frills low-interaction ssh honeypot in Go.☆16Feb 2, 2020Updated 6 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- JavaScript port of passwdqc. A password/passphrase strength checking and policy enforcement toolset.☆15Aug 8, 2019Updated 6 years ago
- Korean Dictionaries for Yomichan☆24Jul 16, 2023Updated 2 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Generates keyboard sequences according to a given layout and creates dictionary files for bruteforcing☆14Jan 29, 2014Updated 12 years ago
- A more full featured C# API for connecting to and managing Active Directory (AD) and Lightweight Directory (AD-LDS) instances, complete w…☆25Sep 8, 2015Updated 10 years ago
- Bleichenbacher's PKCS 1.5 Padding Oracle Attack.☆16Mar 7, 2021Updated 5 years ago
- Full implemented library that handles telegram api and protocol in C# environment for the first time!☆19Nov 29, 2018Updated 7 years ago
- A padding oracle attack on AES-128 made with Python.☆18Jan 10, 2018Updated 8 years ago
- Go Advance Trojan Server For Windows Using Twitter As The C&C Server☆17Mar 13, 2017Updated 9 years ago
- ☆15Oct 24, 2018Updated 7 years ago
- This is a plugin for the c# R.A.T server providing extension to android based phone systems☆20Mar 2, 2018Updated 8 years ago
- Apache Tomcat Remote Code Execution on Windows - CGI-BIN☆80Apr 17, 2019Updated 6 years ago
- PEN-103-Kali-Linux-Revealed-KLR-Cheat-Sheet☆29Oct 19, 2025Updated 5 months ago
- Automatically exported from code.google.com/p/perldroid☆14Aug 24, 2015Updated 10 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Aug 27, 2021Updated 4 years ago
- v2ray 跨平台客户端☆15Oct 19, 2018Updated 7 years ago
- Open-source deobfuscator for dotnetpatcher (https://bitbucket.org/3dotdev/dotnet-patcher/src/)☆23Dec 28, 2015Updated 10 years ago