bones-codes / bombsLinks
A few files for decompression bomb testing –––
☆145Updated last year
Alternatives and similar repositories for bombs
Users that are interested in bombs are comparing it to the libraries listed below
Sorting:
- Gives you root on the hostOS, if you're a member of the 'docker' group.☆205Updated 5 years ago
- ☆148Updated 9 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- ☆270Updated 2 years ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- The source code v3.0 of https://requestbin.net (now is v4.0)☆180Updated 3 months ago
- Private keys that have become public ...☆184Updated this week
- Build two PDFs that have different content but identical SHA1 sums.☆440Updated 11 months ago
- Code execution via Python package installation.☆170Updated 7 years ago
- NTP Main-in-the-Middle tool☆248Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆526Updated 8 years ago
- proxy poc implementation of STARTTLS stripping attacks☆170Updated 4 years ago
- Project Sonar☆237Updated 10 months ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆192Updated 6 years ago
- A tool for generating worst-case inputs to commonly used algorithms☆119Updated 2 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆226Updated 3 years ago
- Script to identify hosts vulnerable to CVE-2018-10933☆232Updated 7 years ago
- Git index file parser, using python3☆229Updated 3 years ago
- Summary and archives of leaked Russian TLD DNS data☆186Updated 8 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆498Updated 2 years ago
- Grab ssh keys from ssh-agent☆222Updated 5 years ago
- Password Hash Identification☆222Updated 12 years ago
- Named vulnerabilities and their practical impact☆436Updated 4 years ago
- Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆171Updated 7 years ago
- Write JavaScript alert(1) with Katakana characters only☆148Updated 8 years ago
- Git manager for pentesters☆108Updated 9 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆153Updated 9 years ago
- Internet data acquisition☆152Updated 5 years ago
- ☆146Updated 5 years ago
- XFLTReaT tunnelling framework☆328Updated 5 years ago