dimkarakostas / breachLinks
Tool to execute BREACH attack.
☆25Updated 7 years ago
Alternatives and similar repositories for breach
Users that are interested in breach are comparing it to the libraries listed below
Sorting:
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago
- ☆86Updated 10 years ago
- Tool to help identify timing attacks☆70Updated 13 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- A victims'-profile-based wordlist generating tool for social engineers and security researchers!☆62Updated 8 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆174Updated 11 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated 11 months ago
- SSH User Enumeration Script in Python Using The Timing Attack☆93Updated 8 years ago
- ☆150Updated 2 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- berzerk0's GitHub Page☆47Updated 2 years ago
- Network based protocol fuzzer☆73Updated 3 years ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Updated 8 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Linux pentest tools☆88Updated 5 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆103Updated 8 years ago
- ☆75Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- unix wildcard attacks☆135Updated 7 years ago
- IMAJS meet <img>☆54Updated 10 years ago
- scripts for pentesting☆89Updated 6 years ago
- Plugin for keepnote to import a XML nmap file☆27Updated 9 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- ☆92Updated 7 years ago