breakerspace / weaponizing-censorsLinks
censors pose a threat to the entire Internet
β134Updated 3 years ago
Alternatives and similar repositories for weaponizing-censors
Users that are interested in weaponizing-censors are comparing it to the libraries listed below
Sorting:
- β302Updated last year
- CVE-2021-3449 OpenSSL denial-of-service exploit π¨π»βπ»β226Updated 3 years ago
- β277Updated 2 years ago
- LZR quickly detects and fingerprints unexpected services running on unexpected ports.β174Updated 2 months ago
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS serverβ122Updated 3 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)β99Updated 4 years ago
- Let's be scanned. A low-interaction honeypot focused on network scanners and bots. It integrates very well with IVRE to build a self-hostβ¦β125Updated last week
- SADDNS: Side Channel Based DNS Cache Poisoning Attackβ58Updated 3 years ago
- HTTP3-attacks (CVE-2022-30592)β77Updated 2 years ago
- Grammar-based HTTP/1 fuzzer with mutation abilityβ251Updated 7 months ago
- Wi-Fi Framework for creating proof-of-concepts, automated experiments, test suites, fuzzers, and more.β235Updated 2 months ago
- Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrtβ183Updated 3 years ago
- findCDN is a tool created to help accurately identify what CDN a domain is using.β118Updated 2 weeks ago
- Repository for application-layer loop DoSβ33Updated last year
- CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalationβ570Updated 3 years ago
- Vault Exploit Defenseβ125Updated 9 months ago
- Command line fuzzer and bruteforcer πͺ wfuzz for commandβ86Updated 2 years ago
- Cisco ASA Software and ASDM Security Researchβ85Updated 2 years ago
- bpflock - eBPF driven security for locking and auditing Linux machinesβ147Updated 3 years ago
- IoT and Operational Technology Honeypotβ103Updated last year
- NIST-based CVE lookup store and API powered by Rust.β130Updated last week
- Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacksβ372Updated 6 months ago
- Hyenae NG is an advanced cross-platform network packet generator and the successor of Hyenae. It features full network layer spoofing, paβ¦β129Updated 2 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkitsβ133Updated 2 years ago
- Project to decrypt and parse SSH trafficβ66Updated 4 years ago
- your censor is my censor: weaponizing residual censorship to perform availability attacksβ22Updated 3 years ago
- Owfuzz: a WiFi protocol fuzzing toolβ232Updated 2 years ago
- Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.β257Updated 3 years ago
- Coverage-based fuzzer for python applicationsβ236Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filteringβ210Updated 4 years ago