dxa4481 / whatsinmyredisLinks
A CSRF demonstration of stealing local Redis data, and encrypting all Redis instances on a local network
☆54Updated 8 years ago
Alternatives and similar repositories for whatsinmyredis
Users that are interested in whatsinmyredis are comparing it to the libraries listed below
Sorting:
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- Tagging and annotation framework for scan data☆102Updated 6 years ago
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆190Updated 6 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- vcsmap is a plugin-based tool to scan public version control systems for sensitive information.☆140Updated 3 years ago
- Proof of Concept code for CVE-2016-5696☆101Updated 8 years ago
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆178Updated 2 years ago
- Jaqen - Simple DNS rebinding☆73Updated 7 years ago
- ☆73Updated 12 years ago
- Parse HTTP Security Headers☆38Updated 10 months ago
- Subdomain Analyzer☆77Updated 8 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- Mass scanning the internet (http and https) using a raw tcpstack.☆59Updated 8 years ago
- proxy poc implementation of STARTTLS stripping attacks☆168Updated 3 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- Damn Small FI Scanner☆60Updated 5 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- ☆71Updated 9 years ago
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- Files from Zeronights presentation.☆28Updated 12 years ago
- Tainted PhantomJS☆52Updated 10 years ago
- Mass scanning and fuzzing library☆49Updated 7 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 4 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆198Updated 8 years ago