fjserna / CVE-2015-7547
Proof of concept for CVE-2015-7547
☆544Updated 9 years ago
Alternatives and similar repositories for CVE-2015-7547:
Users that are interested in CVE-2015-7547 are comparing it to the libraries listed below
- Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)☆186Updated 5 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- Haka runtime☆449Updated 7 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆276Updated 9 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- Current development of SSLyze now takes place on a separate repository☆644Updated 9 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆327Updated 8 years ago
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- Various PoCs☆490Updated 5 years ago
- A tool to help you write binary exploits☆607Updated 6 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆301Updated 3 years ago
- Free sampling of files from the purported Equation Group hack.☆179Updated 8 years ago
- ASUS Router infosvr UDP Broadcast root Command Execution☆252Updated 9 years ago
- xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time | poc or gtfo☆395Updated 9 years ago
- Files from my DEFCON CTF VM.☆269Updated 8 years ago
- ☆135Updated 9 years ago
- Patch Binaries via MITM: BackdoorFactory + mitmProxy.☆995Updated 3 years ago
- some codes and notes about the backdoor listening on TCP-32764 in linksys WAG200G.☆1,285Updated 5 years ago
- Sniffing browser history using HSTS☆936Updated 7 years ago
- Quantum Insert☆212Updated 6 years ago
- A Python Framework For NoSQL Scanning and Exploitation☆597Updated 2 months ago
- Sandboxed Execution Environment☆818Updated 4 years ago
- All your IPs are belong to us.☆669Updated 6 years ago
- Go library and command line to seek for secrets on various sources.☆242Updated 5 years ago
- Documentation for the Mechanical Phish.☆233Updated 8 years ago
- The DrK Attack - Proof of concept☆342Updated 2 years ago
- How to backdoor Diffie-Hellman☆611Updated 8 years ago
- Deprecated - MIG Memory Forensic library☆386Updated 3 years ago
- Wolves Among the Sheep☆147Updated last year
- 2016 DEF CON Qualifier Challenges☆180Updated 8 years ago