cyberisltd / GzipBloatLinks
PHP framework to test User-Agents and intermediary content inspection devices for denial-of-service vulnerabilities with respect to HTTP response decompression.
☆27Updated 12 years ago
Alternatives and similar repositories for GzipBloat
Users that are interested in GzipBloat are comparing it to the libraries listed below
Sorting:
- ☆56Updated 8 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- ☆38Updated 8 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- bash script to download publicly available .svn directories☆16Updated 8 years ago
- DNS zone transfer research☆59Updated 8 years ago
- ☆25Updated 8 years ago
- Some NSE scripts to search information from routers☆35Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 9 years ago
- A python TLS library for penetration testers☆68Updated 8 years ago
- ☆27Updated 8 years ago
- Project for the Crypto subject at Uni☆18Updated 8 years ago
- An implementation of the hashcat rules engine in javascript☆49Updated 7 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆63Updated 7 years ago
- Usefull snippets / Computer-security oriented☆21Updated 8 years ago
- A command line tool to enumerate TLS cipher-suites supported by a server☆35Updated 8 years ago
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Updated 8 years ago
- Utility to decompress Linux swsusp hibernation file.☆29Updated 4 years ago
- ☆25Updated 8 years ago
- Password analysis software☆37Updated 10 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS☆105Updated 4 years ago
- ☆44Updated 2 months ago
- Filet-O-Firewall Vulnerability PoC☆61Updated 10 years ago
- Mainframe bruter and screen automation utility.☆43Updated 11 years ago
- proxy poc implementation of STARTTLS stripping attacks☆168Updated 3 years ago