concise / logjam-attack-pocLinks
An implementation of the concepts behind the Logjam attack
☆16Updated 9 years ago
Alternatives and similar repositories for logjam-attack-poc
Users that are interested in logjam-attack-poc are comparing it to the libraries listed below
Sorting:
- ☆15Updated 8 years ago
- Format string exploit generation☆10Updated 9 years ago
- This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CV…☆93Updated 7 years ago
- hax 'n shit☆119Updated 10 years ago
- NAT Pinning test suite tool for penetration testers.☆31Updated 11 years ago
- ☆36Updated 12 years ago
- ARP Man-in-the-Middle tool☆29Updated 5 months ago
- ☆28Updated 9 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Updated 3 years ago
- drivesploit-testing☆26Updated 14 years ago
- Shellcodes for different usecases☆9Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- GSAudit at Symantec, ExeAudit at RIM, RECX Binary Assurance for Windows at Recx etc. - core library now WinBinaryAudit☆24Updated 9 years ago
- Simple php backdoor based on extension☆22Updated 10 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Updated 8 years ago
- Python implementation of pattern_create and pattern_offset from Metasploit Framework☆18Updated 5 years ago
- Universal LAN-based SSRF Attack Primitive☆19Updated 5 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆27Updated 6 years ago
- ☆44Updated 3 weeks ago
- Bluetooth PIN and LINK-KEY Cracker☆51Updated 11 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 8 years ago
- PyCommand Scripts for Immunity Debugger☆36Updated 10 years ago
- CVE-2017-5689 Proof-of-Concept exploit☆56Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Leveraging CWMP (CPE WAN Management Protocol) to extract vendor specific secrets and configurations from CPEs☆12Updated 6 years ago
- Performs method enumeration and interrogation against flash remoting end points.☆38Updated 4 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Miscellaneous analysis tools☆27Updated 10 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago