firefart / isp_stats
☆11Updated 5 years ago
Alternatives and similar repositories for isp_stats:
Users that are interested in isp_stats are comparing it to the libraries listed below
- Cryptography: a proof-of-concept attack against the MAC-then-encrypt scheme☆7Updated 9 years ago
- ☆14Updated 4 years ago
- spectrum monitoring system for GSM providers☆44Updated 9 years ago
- CVE-2017-7494 - Detection Scripts☆63Updated 7 years ago
- Script to find exploitable magic methods for PHP object injection☆27Updated 10 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Parallel APK analyzer☆51Updated 8 years ago
- ☆45Updated 7 years ago
- ☆12Updated 9 years ago
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- Beagle(bone) in the Middle☆25Updated 4 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Burp and ZAP plugin that display image metadata (JPEG Exif or PNG text chunk).☆14Updated last year
- Configuration security audit framework☆23Updated 8 years ago
- bash script to download publicly available .svn directories☆16Updated 7 years ago
- ☆16Updated 9 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆63Updated 7 years ago
- All related files and slides for past talks☆44Updated last year
- Burp plugin that clusters responses to show an overview of received responses☆15Updated 5 years ago
- POLAR☆73Updated 6 years ago
- intel amt honeypot☆18Updated 7 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- ☆20Updated 8 years ago