ROCA: Infineon RSA key vulnerability
☆492Oct 19, 2023Updated 2 years ago
Alternatives and similar repositories for roca
Users that are interested in roca are comparing it to the libraries listed below
Sorting:
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆302Jan 12, 2023Updated 3 years ago
- ☆12Aug 17, 2020Updated 5 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆472Sep 23, 2017Updated 8 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,092Feb 19, 2019Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- Linux Memory Cryptographic Keys Extractor☆240May 22, 2023Updated 2 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- An automated toolkit to analyze and detect changes in secure hardware and cryptographic libraries. SCRUTINY provides high-level framework…☆16Feb 12, 2026Updated 2 weeks ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated 2 weeks ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,380May 22, 2020Updated 5 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Simple DDE object detector☆56Nov 24, 2017Updated 8 years ago
- Encrypted exploit delivery for the masses☆270Sep 25, 2019Updated 6 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- kernel privilege escalation enumeration and exploitation framework☆701Aug 2, 2018Updated 7 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- Know the dangers of credential reuse attacks.☆2,094Dec 9, 2025Updated 2 months ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,213Feb 6, 2022Updated 4 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,449Nov 20, 2025Updated 3 months ago
- proxy poc implementation of STARTTLS stripping attacks☆169Nov 25, 2021Updated 4 years ago
- Offline debugger for malware's reverse engineering☆116Jan 21, 2015Updated 11 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- Collection of scripts and templates to generate Office documents embedded with the DDE, macro-less command execution technique.☆638Jul 16, 2023Updated 2 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆827Nov 3, 2017Updated 8 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Nov 29, 2017Updated 8 years ago
- Turn your Burp suite into headless active web application vulnerability scanner☆155Mar 1, 2018Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035May 27, 2020Updated 5 years ago
- Android APK analyzer based on radare2 and others.☆154Apr 9, 2020Updated 5 years ago