Tool to execute BREACH attack.
☆26Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for breach
Users that are interested in breach are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated 2 years ago
- remote control an android phone via ADB☆10Nov 17, 2015Updated 10 years ago
- Contract to record hashes of recent and historic blocks☆14Sep 28, 2015Updated 10 years ago
- A set of templates for different academic venues.☆29Jun 18, 2019Updated 6 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago
- Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆171Jul 28, 2018Updated 7 years ago
- ☆22May 29, 2020Updated 5 years ago
- Android NFC App to read and display the Track 2 information from a PayPass/PayWave card. using EMV library http://sourceforge.net/proje…☆24Mar 12, 2015Updated 11 years ago
- Config-Exploiter Dump config.php file from joomla and wordpress websites☆39Sep 30, 2018Updated 7 years ago
- Selective wifi jammer - control who can connect where☆47Sep 12, 2017Updated 8 years ago
- How to make a simple IMSI Catcher (Credit: Keld Norman)☆48Feb 24, 2018Updated 8 years ago
- Hacker101☆46Aug 14, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Tool to simulate staking behaviour in Proof-of-Stake blockchains, especially tailored towards Cardano.☆15Dec 24, 2025Updated 4 months ago
- A physically based offline renderer☆10Jan 7, 2024Updated 2 years ago
- Provisions: Privacy-preserving proofs of solvency for Bitcoin☆14Jan 10, 2016Updated 10 years ago
- C++ Bitcoin SPV Client☆12Jan 4, 2018Updated 8 years ago
- A high-level wrapper around BCoin☆25Dec 22, 2015Updated 10 years ago
- CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android☆10Feb 13, 2017Updated 9 years ago
- Full implementation of SmartOTPs: An air-gapped 2-factor authentication for smart-contract wallets.☆13Feb 23, 2026Updated 2 months ago
- Linux Metrics Workshop☆11Jun 30, 2020Updated 5 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Python-module to provide an API to KeePass 1.x files commonly used by KeePassX.☆29Dec 10, 2018Updated 7 years ago
- search ip cam on network☆21Aug 3, 2016Updated 9 years ago
- My thesis of me and my friend. Subject for Android security☆14Sep 19, 2019Updated 6 years ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆168Jul 10, 2014Updated 11 years ago
- CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android☆17Nov 27, 2016Updated 9 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 6 years ago
- Database for bcoin☆17Dec 10, 2024Updated last year
- ☆12Feb 16, 2017Updated 9 years ago
- Automatically spin up infra for phishing☆63Feb 1, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A collection of awesome penetration testing resources, tools and other shiny things☆14Sep 23, 2019Updated 6 years ago
- Extract Wi-Fi passwords from a non-rooted (really) Android phone☆18Apr 19, 2026Updated 2 weeks ago
- PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)☆175Jan 2, 2018Updated 8 years ago
- Proof of Assets (PoA) is a scheme designed to let entitites (operators) prove that they control a given amount of Bitcoin or other blockc…☆27Nov 16, 2015Updated 10 years ago
- A script to automatically connect android devices in debug mode using WIFI☆74Feb 14, 2021Updated 5 years ago
- Open Source Intelligence Tools, Writeups, Web Reconnaissance, Toolkits, Other Awesome Represotries and More☆15Apr 28, 2020Updated 6 years ago
- A collection of scripts & tools for reverse-engineering & hacking SCADA/ICS devices.☆109Mar 14, 2018Updated 8 years ago