bones-codes / bombsLinks
A few files for decompression bomb testing –––
☆145Updated 11 months ago
Alternatives and similar repositories for bombs
Users that are interested in bombs are comparing it to the libraries listed below
Sorting:
- Gives you root on the hostOS, if you're a member of the 'docker' group.☆205Updated 5 years ago
 - Private keys that have become public ...☆184Updated last week
 - The source code v2.0 of https://requestbin.net (now is v3.0)☆177Updated last month
 - Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆171Updated 7 years ago
 - ☆272Updated 2 years ago
 - Code execution via Python package installation.☆170Updated 6 years ago
 - ☆147Updated 9 years ago
 - Detection script for the ROBOT vulnerability☆272Updated 3 years ago
 - Probe a rendering engine for vulnerabilities and other features☆367Updated 4 years ago
 - Nameserver DNS poisoning attacks made easy☆525Updated 8 years ago
 - CTF in a box. Minimal setup required. (not production-ready yet)☆82Updated 2 years ago
 - Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
 - Password Hash Identification☆221Updated 11 years ago
 - Named vulnerabilities and their practical impact☆436Updated 3 years ago
 - ROCA: Infineon RSA key vulnerability☆487Updated 2 years ago
 - TLS Redirection☆120Updated 7 years ago
 - 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆134Updated 8 years ago
 - An automated XSS payload generator written in python.☆315Updated 9 years ago
 - proxy poc implementation of STARTTLS stripping attacks☆169Updated 3 years ago
 - A Burp Plugin for Detecting Weaknesses in Content Security Policies☆168Updated 2 years ago
 - Git manager for pentesters☆108Updated 9 years ago
 - Write JavaScript alert(1) with Katakana characters only☆146Updated 8 years ago
 - PoC code to extract private keys from Windows 10's built in ssh-agent service☆176Updated 7 years ago
 - A Tool for DNS Delegation Trust Graphing☆405Updated 2 years ago
 - Pillage web accessible GIT, HG and BZR repositories☆324Updated 8 years ago
 - Internet data acquisition☆151Updated 4 years ago
 - Turn your Burp suite into headless active web application vulnerability scanner☆154Updated 7 years ago
 - A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆656Updated 3 years ago
 - a grep -r for secrets☆178Updated 3 years ago
 - Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆495Updated last year