Tool to execute BREACH attack.
☆26Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for breach
Users that are interested in breach are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- remote control an android phone via ADB☆10Nov 17, 2015Updated 10 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆171Jul 28, 2018Updated 7 years ago
- Android NFC App to read and display the Track 2 information from a PayPass/PayWave card. using EMV library http://sourceforge.net/proje…☆24Mar 12, 2015Updated 11 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Sep 30, 2018Updated 7 years ago
- ADB Based Acquisition Tool for Android Forensics☆44Mar 30, 2021Updated 4 years ago
- Selective wifi jammer - control who can connect where☆48Sep 12, 2017Updated 8 years ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆46Feb 24, 2018Updated 8 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Hacker101☆46Aug 14, 2018Updated 7 years ago
- Learn Cyber Security-1 in 30 Days!☆47Jul 11, 2020Updated 5 years ago
- CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android☆10Feb 13, 2017Updated 9 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- search ip cam on network☆20Aug 3, 2016Updated 9 years ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆167Jul 10, 2014Updated 11 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- A Firefox Extension to add CORS headers to responses.☆28Dec 4, 2012Updated 13 years ago
- wirelessFirmware☆66Oct 31, 2020Updated 5 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆174Jan 2, 2018Updated 8 years ago
- Open Source Intelligence Tools, Writeups, Web Reconnaissance, Toolkits, Other Awesome Represotries and More☆15Apr 28, 2020Updated 5 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆110Mar 14, 2018Updated 8 years ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Javascript guilloche generator☆14Feb 3, 2015Updated 11 years ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13May 25, 2024Updated last year
- Open-source decompilation of Disstrack☆12Oct 18, 2016Updated 9 years ago
- A UDP based network protocol designed to fit the needs of games.☆23Dec 7, 2015Updated 10 years ago
- A tool to facilitate ROP Chain Development for XML Character Sanitization☆20May 9, 2019Updated 6 years ago
- Very Simple Python Generator from UML - GenMyModel customgen☆14Aug 28, 2018Updated 7 years ago
- Repository to store the Threat Reports made by the McAfee Enterprise ATR Team☆10Oct 11, 2018Updated 7 years ago