concise / logjam-attack-poc
An implementation of the concepts behind the Logjam attack
☆16Updated 8 years ago
Alternatives and similar repositories for logjam-attack-poc:
Users that are interested in logjam-attack-poc are comparing it to the libraries listed below
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 6 years ago
- NAT Pinning test suite tool for penetration testers.☆30Updated 10 years ago
- ☆13Updated 7 years ago
- ☆15Updated 8 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆26Updated 6 years ago
- ☆45Updated this week
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆15Updated 6 years ago
- Bluetooth PIN and LINK-KEY Cracker☆48Updated 10 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- Public Advisories for Security Vulnerabilities.☆25Updated 9 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆50Updated 7 years ago
- An SNMPv1, v2c and v3 dictionary attack tool. Please see: https://penturalabs.wordpress.com/2016/04/01/snmpplux/☆19Updated 8 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Blueborne CVE-2017-1000251 PoC for linux machines☆16Updated last year
- This tool for crack hash password BLAKE-224 BLAKE-256 BLAKE-512 BLAKE-384 with bruteforce method☆18Updated 6 years ago
- Source distribution of the Ghidra software reverse engineering (SRE) framework https://www.nsa.gov/ghidra☆9Updated 5 years ago
- I'll post my custom shellcode I make here!☆22Updated 5 years ago
- PoC code for crashing windows active directory☆35Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆20Updated 6 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆55Updated 7 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 7 years ago
- ARP Man-in-the-Middle tool☆28Updated last month
- Porting BlueKeep PoC from @Ekultek to actual exploits☆10Updated 5 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- A medley of PoCs and exploits☆1Updated 5 years ago
- Multithreaded DNS recursive host brute-force tool☆13Updated 9 years ago