decrypto-org / rupture
A framework for BREACH and other compression-based crypto attacks
☆229Updated 5 years ago
Alternatives and similar repositories for rupture
Users that are interested in rupture are comparing it to the libraries listed below
Sorting:
- a grep -r for secrets☆179Updated 3 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆197Updated 8 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- ☆113Updated 7 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆161Updated 8 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆458Updated last year
- ☆92Updated 6 years ago
- Wolves Among the Sheep☆147Updated last year
- Snarf man-in-the-middle / relay suite☆205Updated 8 years ago
- Linux Memory Cryptographic Keys Extractor☆238Updated last year
- 🔥🔥🔥 Out of the Browser into the Fire - Cross platform XSS worm framework 🔥🔥🔥☆134Updated 8 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆167Updated last year
- Public repository for improvements to the EXTRABACON exploit☆160Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- A regex based source code scanner.☆129Updated 8 years ago
- A project designed to parse public source code repositories and find various types of vulnerabilities.☆192Updated 7 years ago
- Web Sight Docker Deployment☆123Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆243Updated 10 years ago
- Tool for breaking into web applications.☆91Updated 5 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- Mass scanner for the Java serialize bug☆151Updated 6 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆194Updated 9 years ago
- A webshell framework for penetration testers.☆297Updated last year
- ☆198Updated 9 years ago
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆159Updated 9 years ago
- Auto Domain Admin and Network Exploitation.☆299Updated 7 years ago