cyberisltd / GzipBloat
PHP framework to test User-Agents and intermediary content inspection devices for denial-of-service vulnerabilities with respect to HTTP response decompression.
☆26Updated 11 years ago
Related projects: ⓘ
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 8 years ago
- ☆56Updated 7 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Updated 7 years ago
- Misc PoCs for various research topics☆21Updated last year
- Parallel APK analyzer☆51Updated 7 years ago
- ☆25Updated 7 years ago
- "RansomPKP" proof of concept.☆11Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 10 years ago
- ☆20Updated this week
- Password analysis software☆37Updated 9 years ago
- ☆25Updated 7 years ago
- CVE-2017-7494 - Detection Scripts☆63Updated 7 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 6 years ago
- A web spider's worst nightmare.☆51Updated 11 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆26Updated 7 years ago
- Tools to interact with a certificate transparency server☆22Updated 9 years ago
- Convert a list of IP addresses/ranges to their minimized cidr form☆36Updated 9 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 10 years ago
- Monitoring 'DNS' inside the Tor network☆91Updated 7 years ago
- SIGSTOPing ELF binaries since 0x7E1☆50Updated last month
- Reveal encrypted files stored on a filesystem.☆51Updated 5 years ago
- ☆12Updated 7 years ago
- Mass DNS resolution tool☆36Updated 3 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Updated 8 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 6 years ago
- ☆27Updated 7 years ago