bones-codes / bombsLinks
A few files for decompression bomb testing –––
☆145Updated last year
Alternatives and similar repositories for bombs
Users that are interested in bombs are comparing it to the libraries listed below
Sorting:
- Gives you root on the hostOS, if you're a member of the 'docker' group.☆205Updated 5 years ago
- Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)☆497Updated last year
- ☆147Updated 9 years ago
- The source code v3.0 of https://requestbin.net (now is v4.0)☆177Updated 2 months ago
- Detection script for the ROBOT vulnerability☆272Updated 3 years ago
- ☆273Updated 2 years ago
- Nameserver DNS poisoning attacks made easy☆525Updated 8 years ago
- Write JavaScript alert(1) with Katakana characters only☆147Updated 8 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆657Updated 3 years ago
- Private keys that have become public ...☆184Updated last week
- Code execution via Python package installation.☆170Updated 7 years ago
- This tool can forward TCP traffic over DNS protocol. Non-compile clients + socks5 support.☆413Updated 5 years ago
- A Tool for DNS Delegation Trust Graphing☆406Updated 2 years ago
- Try to find the password of a file that was encrypted with the 'openssl' command.☆232Updated last year
- Build two PDFs that have different content but identical SHA1 sums.☆440Updated 9 months ago
- ROCA: Infineon RSA key vulnerability☆491Updated 2 years ago
- Script to identify hosts vulnerable to CVE-2018-10933☆232Updated 7 years ago
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆404Updated 2 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆505Updated 4 years ago
- A tool for generating worst-case inputs to commonly used algorithms☆121Updated 2 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- GTRS - Google Translator Reverse Shell☆623Updated 2 months ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 4 years ago
- Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆170Updated 7 years ago
- CVE-2018-10933 very simple POC☆126Updated 7 years ago
- Named vulnerabilities and their practical impact☆436Updated 3 years ago
- TLS Redirection☆120Updated 8 years ago
- Fast http dead file finder.☆217Updated 4 months ago
- XFLTReaT tunnelling framework☆328Updated 5 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆226Updated 3 years ago