Tool to execute BREACH attack.
☆26Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for breach
Users that are interested in breach are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆171Jul 28, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Android NFC App to read and display the Track 2 information from a PayPass/PayWave card. using EMV library http://sourceforge.net/proje…☆24Mar 12, 2015Updated 11 years ago
- Selective wifi jammer - control who can connect where☆48Sep 12, 2017Updated 8 years ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆46Feb 24, 2018Updated 8 years ago
- This is a tiny Chrome Extension that protects your from Clipboard XSS Attacks☆19Mar 30, 2015Updated 10 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- A sample web application with Clickjacking vulnerabilities and its attacker website.☆12Feb 10, 2022Updated 4 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android☆10Feb 13, 2017Updated 9 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆167Jul 10, 2014Updated 11 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- ☆66Mar 21, 2018Updated 8 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- Extract Wi-Fi passwords from a non-rooted (really) Android phone☆18Feb 26, 2023Updated 3 years ago
- A Firefox Extension to add CORS headers to responses.☆28Dec 4, 2012Updated 13 years ago
- wirelessFirmware☆66Oct 31, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆174Jan 2, 2018Updated 8 years ago
- A script to automatically connect android devices in debug mode using WIFI☆74Feb 14, 2021Updated 5 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆110Mar 14, 2018Updated 8 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Open-source decompilation of Disstrack☆12Oct 18, 2016Updated 9 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Very Simple Python Generator from UML - GenMyModel customgen☆14Aug 28, 2018Updated 7 years ago
- p0f Python Wrapper☆17Sep 29, 2013Updated 12 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- Mirror network traffic from one interface to another on Windows☆25Feb 26, 2020Updated 6 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- An example Spark Streaming application processing PCAP data.☆21Feb 24, 2017Updated 9 years ago
- Command Line interface to bitbucket.org☆16Jan 8, 2021Updated 5 years ago
- Proof-of-concept code for Heartbleed a.k.a. CVE2014-0160 with STARTTLS support for various protocols☆43Jan 7, 2019Updated 7 years ago
- Grid-based levels, level-based games. Keyboard driven.☆12Mar 6, 2016Updated 10 years ago