dimkarakostas / breachView external linksLinks
Tool to execute BREACH attack.
☆26Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for breach
Users that are interested in breach are comparing it to the libraries listed below
Sorting:
- Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆171Jul 28, 2018Updated 7 years ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)☆41Dec 3, 2025Updated 2 months ago
- ☆12Feb 16, 2017Updated 8 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- ☆11Jul 10, 2024Updated last year
- URL Fuzzer/Spider☆34Apr 10, 2016Updated 9 years ago
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- ☆13Dec 28, 2024Updated last year
- tfa is a 2fa cli tool that aims to help you to generate 2fa code on CI/CD pipelines.☆28Oct 26, 2021Updated 4 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- scripts to create zip bombs☆12Nov 26, 2012Updated 13 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Feb 1, 2019Updated 7 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- a transparent filter for all of the various ways of sharing location☆10Apr 26, 2019Updated 6 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Jul 14, 2022Updated 3 years ago
- Interactive IRC bot and logger in pure Bash☆16Dec 12, 2012Updated 13 years ago
- Insecure web application used to test system security controls☆13Oct 14, 2025Updated 4 months ago
- A greybox fuzzer for continuous integration☆10Dec 15, 2023Updated 2 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- "Unmix" takes a long mix and split it to tracks☆12Jun 27, 2015Updated 10 years ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- Build and publish Docker images, run builds/tasks within Docker containers or on remote hosts.☆16Feb 3, 2026Updated last week
- Custom firmware for DEFCON 27 badge which iterates over all types☆12Aug 11, 2019Updated 6 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated 3 weeks ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- router firmwares, reverse engineering code snippets, mitm tools☆14Mar 20, 2020Updated 5 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- VTable Hijacking Protection for Binaries☆12Feb 28, 2017Updated 8 years ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- Simple TR64 UPnP: A simple way to talk to your UPnP and/or TR64 protocol devices☆11Mar 13, 2021Updated 4 years ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 2 months ago
- Based on shawarkhanethicalhacker/BruteXSS☆15Jan 24, 2019Updated 7 years ago
- Program to extract files from a WindowsCE firmware dump.☆13Mar 20, 2022Updated 3 years ago
- This work-in-progress "Orion Webshell Detector" was created with the intention of assisting web application code reviews coded in PHP, AS…☆13Oct 28, 2014Updated 11 years ago
- Prometheus exporter for CISCO Unified Communication Manager metrics☆17Dec 8, 2024Updated last year