Tool to execute BREACH attack.
☆26Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for breach
Users that are interested in breach are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated 2 years ago
- Get files from Android directories☆11Dec 9, 2018Updated 7 years ago
- Contract to record hashes of recent and historic blocks☆14Sep 28, 2015Updated 10 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- simple script to pwn android phone with physical access☆26Dec 22, 2018Updated 7 years ago
- Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆171Jul 28, 2018Updated 7 years ago
- Android NFC App to read and display the Track 2 information from a PayPass/PayWave card. using EMV library http://sourceforge.net/proje…☆24Mar 12, 2015Updated 11 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Sep 30, 2018Updated 7 years ago
- Selective wifi jammer - control who can connect where☆48Sep 12, 2017Updated 8 years ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆46Feb 24, 2018Updated 8 years ago
- A tiny tool to restrict the cursor to a specific window. Useful for games in multi-monitor setups especially with games using edge scroll…☆16May 29, 2020Updated 5 years ago
- pure python remote adb scanner + nmap scan module☆22Dec 7, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A ransomware written in python for Windows☆13Aug 10, 2022Updated 3 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆15Jan 14, 2019Updated 7 years ago
- Hacker101☆46Aug 14, 2018Updated 7 years ago
- Learn Cyber Security-1 in 30 Days!☆47Jul 11, 2020Updated 5 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- Business search, fun with rate limiting☆20Oct 5, 2019Updated 6 years ago
- search ip cam on network☆21Aug 3, 2016Updated 9 years ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆166Jul 10, 2014Updated 11 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android☆17Nov 27, 2016Updated 9 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- ☆12Feb 16, 2017Updated 9 years ago
- Automatically spin up infra for phishing☆63Feb 1, 2020Updated 6 years ago
- Search engine scraper tool with BASH script.☆83Jan 28, 2020Updated 6 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13Sep 23, 2019Updated 6 years ago
- Extract Wi-Fi passwords from a non-rooted (really) Android phone☆18Feb 26, 2023Updated 3 years ago
- wirelessFirmware☆66Oct 31, 2020Updated 5 years ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆174Jan 2, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- Proof of Assets (PoA) is a scheme designed to let entitites (operators) prove that they control a given amount of Bitcoin or other blockc…☆27Nov 16, 2015Updated 10 years ago
- A script to automatically connect android devices in debug mode using WIFI☆74Feb 14, 2021Updated 5 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆26Jul 31, 2025Updated 8 months ago
- Python framework for extracting secret data from compression oracles such as those exploited by the BEAST and CRIME attacks.☆12Apr 22, 2015Updated 10 years ago
- Scripts and tools to automate a Windows 7 installation for QEMU☆14Nov 4, 2015Updated 10 years ago
- Sniffs sensitive data from interface or pcap☆17Mar 10, 2015Updated 11 years ago