glv2 / bruteforce-salted-opensslLinks
Try to find the password of a file that was encrypted with the 'openssl' command.
☆232Updated last year
Alternatives and similar repositories for bruteforce-salted-openssl
Users that are interested in bruteforce-salted-openssl are comparing it to the libraries listed below
Sorting:
- Padding oracle attack against PKCS7☆332Updated 3 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆261Updated 2 years ago
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆404Updated 2 years ago
- Automated Linux evil maid attack☆433Updated 9 years ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆167Updated 11 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆505Updated 4 years ago
- A simple embedded Linux backdoor.☆199Updated 5 years ago
- Database of private SSL/SSH keys for embedded devices☆267Updated last year
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆466Updated last year
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆292Updated 6 years ago
- The IKE Scanner☆399Updated last year
- NTP Main-in-the-Middle tool☆247Updated 3 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891Updated 5 years ago
- kernel privilege escalation enumeration and exploitation framework☆697Updated 7 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆380Updated 2 years ago
- All my infosec notes I have been building up over the years☆335Updated 9 months ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆218Updated 2 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆153Updated 9 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆399Updated 6 years ago
- RSHack - Tool for RSA CTF's challenges☆99Updated 7 years ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Private keys that have become public ...☆184Updated this week
- Probe a rendering engine for vulnerabilities and other features☆367Updated 4 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆656Updated 3 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆226Updated 3 years ago
- ☆147Updated 9 years ago
- Static compiled binaries + scripts ready to use on systems☆153Updated 6 months ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 5 years ago
- CTF tool for identifying, brute forcing and decoding encryption schemes in an automated way☆78Updated 3 weeks ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago