Fork: THC-SSL-DOS is a tool to verify the performance of SSL.
☆59Sep 18, 2022Updated 3 years ago
Alternatives and similar repositories for thc-tls-dos
Users that are interested in thc-tls-dos are comparing it to the libraries listed below
Sorting:
- mixed packet injector tool☆20Dec 29, 2020Updated 5 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Apr 30, 2021Updated 4 years ago
- This extension provide a Python panel for writing custom proxy script.☆16Aug 26, 2019Updated 6 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆16Aug 19, 2022Updated 3 years ago
- ohrwurm is an RTP fuzzer. features some SIP parsing and RTCP suppressing.☆17Sep 30, 2010Updated 15 years ago
- Another vulnerability scanner☆18Aug 9, 2025Updated 6 months ago
- ☆17Oct 26, 2018Updated 7 years ago
- inviteflood : SIP/SDP INVITE message flooding over UDP/IP☆12Sep 20, 2015Updated 10 years ago
- send email to multiple users, multiple time with this Email-Bomber☆17Jul 5, 2021Updated 4 years ago
- Crack the verification hash of the encrypted payload of the Gauss Virus☆20Dec 25, 2021Updated 4 years ago
- A Linux backdoor with the goal of circumventing network firewalls.☆16Nov 30, 2011Updated 14 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆15Sep 21, 2015Updated 10 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Python 3 update for https://code.google.com/archive/p/goofile/☆15Aug 19, 2019Updated 6 years ago
- ☆16Mar 4, 2019Updated 7 years ago
- Cymothoa is a backdooring tool, that inject backdoor's shellcode directly into running applications. Stealth and lightweight...☆18Aug 24, 2015Updated 10 years ago
- FTester - firewall and IDS testing tool [historical]☆24Aug 2, 2017Updated 8 years ago
- IPsec IKEv1 PSK+XAUTH MitM attack daemon☆23Mar 20, 2023Updated 2 years ago
- ☆24Nov 3, 2019Updated 6 years ago
- The Grum Spam Bot☆20Feb 25, 2015Updated 11 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Jan 21, 2022Updated 4 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.☆25Jul 26, 2017Updated 8 years ago
- OASIS CACAO TC: Official repository for work of the CACAO TC https://github.com/oasis-tcs/cacao☆32Jan 16, 2024Updated 2 years ago
- laravel 5.8 rce pop chain☆26Oct 27, 2019Updated 6 years ago
- Script(s) to assist with the setup of various tools on a Windows 11/10 VM, in preparation for Corelan Training☆30Feb 11, 2026Updated 3 weeks ago
- Conference Papers and Appendicies (USENIX Security, BlackHat, HITBSecConf, and BeVX)☆27Aug 6, 2023Updated 2 years ago
- Parsero | Robots.txt audit tool☆172Sep 1, 2017Updated 8 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆28Aug 4, 2017Updated 8 years ago
- Future version of the AnyBody Managed Model Repository with a full thoracic spine model.☆18Updated this week
- hatsApp Message Sender is a simple Python application that allows users to send WhatsApp messages programmatically using the pywhatkit li…☆14Nov 17, 2023Updated 2 years ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- gtfo, now with the speed of golang☆62Jun 8, 2020Updated 5 years ago
- PoC CVE-2017-5123 - LPE - Bypassing SMEP/SMAP. No KASLR☆32Jun 26, 2020Updated 5 years ago
- ☆26Jan 18, 2026Updated last month
- Shim to grab keystore backed data☆27Sep 21, 2017Updated 8 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- Go static analysis tool that checks for security issues using an AST.☆29Nov 19, 2018Updated 7 years ago