Tool to execute BREACH attack.
☆26Jul 27, 2018Updated 7 years ago
Alternatives and similar repositories for breach
Users that are interested in breach are comparing it to the libraries listed below
Sorting:
- Wireless pentesting tool with functionalities such as password cracking (in WEP and WPA/WPA2 networks), DoS attacks, client de-authentica…☆12Apr 8, 2024Updated last year
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Jun 12, 2019Updated 6 years ago
- Contract to record hashes of recent and historic blocks☆14Sep 28, 2015Updated 10 years ago
- Decentralized monetary trust network☆32Jul 30, 2017Updated 8 years ago
- Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆171Jul 28, 2018Updated 7 years ago
- A framework for BREACH and other compression-based crypto attacks☆236Feb 11, 2020Updated 6 years ago
- simple script to pwn android phone with physical access☆27Dec 22, 2018Updated 7 years ago
- Follow the bittrex.com orderbook in real time☆33Dec 24, 2018Updated 7 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆41Jul 8, 2020Updated 5 years ago
- An interactive, TLS-capable HTTP intercepting proxy designed for penetration testers and software developers, including a parser for the …☆22Jul 31, 2025Updated 7 months ago
- URL Fuzzer/Spider☆34Apr 10, 2016Updated 9 years ago
- ☆11Jul 10, 2024Updated last year
- OWASP Threat Dragon core files☆11Jan 26, 2026Updated last month
- INACTIVE - http://mzl.la/ghe-archive - Quokka is a utility to launch and monitor application for faults.☆40Apr 1, 2019Updated 6 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Feb 22, 2017Updated 9 years ago
- ☆10Mar 31, 2016Updated 9 years ago
- a transparent filter for all of the various ways of sharing location☆10Apr 26, 2019Updated 6 years ago
- NVD API 2.0 for python☆12Sep 26, 2024Updated last year
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- A list of CVE's with Proof of Concepts☆11Jun 17, 2021Updated 4 years ago
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- The CRIME and BREACH Attacks work against SSL and HTTP Compression. They leverage specific properties of used compression functions and c…☆17Dec 29, 2013Updated 12 years ago
- Composable high-level instrumentation for C libraries' malloc and friends☆18Nov 15, 2025Updated 3 months ago
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Pollard Rho attack on ECDLP with GMP☆10Sep 6, 2022Updated 3 years ago
- ☆13Dec 28, 2024Updated last year
- reinforcement learning for optimal debt collection strategy☆11Dec 8, 2019Updated 6 years ago
- Verify your NIPoPoWs efficiently, here☆11Dec 8, 2022Updated 3 years ago
- A tool for automating cracking methodologies through Hashcat from the TrustedSec team.☆10Feb 1, 2019Updated 7 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆13Sep 23, 2019Updated 6 years ago
- Bitclamp allows arbitrary files to be permanently and anonymously published into the Bitcoin and Dogecoin blockchains.☆14Jan 12, 2017Updated 9 years ago
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- Implementation Code of TextHoaxer☆15Aug 21, 2022Updated 3 years ago
- AWS security scanning checks in a container☆13Apr 11, 2016Updated 9 years ago
- A Python-module to provide an API to KeePass 1.x files commonly used by KeePassX.☆29Dec 10, 2018Updated 7 years ago
- Julia rules for semgrep☆14Dec 9, 2025Updated 2 months ago
- Python client and module for Vulnerability-Lookup.☆14Dec 9, 2025Updated 2 months ago
- VTable Hijacking Protection for Binaries☆12Feb 28, 2017Updated 9 years ago