ROCA: Infineon RSA key vulnerability
☆491Oct 19, 2023Updated 2 years ago
Alternatives and similar repositories for roca
Users that are interested in roca are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Linux ELF x32/x64 ASLR DEP/NX bypass exploit with stack-spraying☆304Jan 12, 2023Updated 3 years ago
- An exploit for Apache Struts CVE-2017-9805☆247Nov 7, 2017Updated 8 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆468Sep 23, 2017Updated 8 years ago
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- Test CVE-2018-0296 and extract usernames☆106Dec 9, 2018Updated 7 years ago
- Tool written in python3 to determine where the AV signature is located in a binary/payload☆315Mar 24, 2018Updated 7 years ago
- This repository is DEPRECATED, please use bettercap as this tool has been ported to its BLE modules.☆1,093Feb 19, 2019Updated 7 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Sep 26, 2021Updated 4 years ago
- security advisories☆12Feb 22, 2021Updated 5 years ago
- A set of exploitation/reversing aids for IDA☆421Nov 28, 2017Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆241May 22, 2023Updated 2 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Nili is a Tool for Network Scan, Man in the Middle, Protocol Reverse Engineering and Fuzzing.☆217Oct 23, 2019Updated 6 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Offline debugger for malware's reverse engineering☆116Jan 21, 2015Updated 11 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Nov 29, 2017Updated 8 years ago
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated last month
- Know the dangers of credential reuse attacks.☆2,102Dec 9, 2025Updated 3 months ago
- kernel privilege escalation enumeration and exploitation framework☆701Aug 2, 2018Updated 7 years ago
- Perform a MitM attack and extract clear text credentials from RDP connections☆1,452Nov 20, 2025Updated 4 months ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Encrypted exploit delivery for the masses☆271Sep 25, 2019Updated 6 years ago
- proxy poc implementation of STARTTLS stripping attacks☆169Nov 25, 2021Updated 4 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2☆1,216Feb 6, 2022Updated 4 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆202Nov 30, 2017Updated 8 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆602Dec 6, 2024Updated last year
- Find interesting Amazon S3 Buckets by watching certificate transparency logs.☆1,802Feb 28, 2025Updated last year
- DLL-injection based solution to Brecht Wyseur's wbDES challenge (based on SysK's Phrack article)☆43Nov 6, 2017Updated 8 years ago
- A Linux or OSX tool that uses psutil to monitor devices while your computer is locked. In the case it detects someone plugging in or unpl…☆583Oct 9, 2017Updated 8 years ago
- An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector☆1,019Sep 11, 2017Updated 8 years ago
- Simple application for playing with elliptic curves☆43Nov 24, 2022Updated 3 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆193Oct 6, 2017Updated 8 years ago
- ☆614Oct 4, 2024Updated last year
- ☆3,496Dec 25, 2024Updated last year