glv2 / bruteforce-salted-opensslLinks
Try to find the password of a file that was encrypted with the 'openssl' command.
☆227Updated last year
Alternatives and similar repositories for bruteforce-salted-openssl
Users that are interested in bruteforce-salted-openssl are comparing it to the libraries listed below
Sorting:
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆400Updated 2 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆258Updated last year
- All my infosec notes I have been building up over the years☆336Updated 5 months ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆163Updated 11 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- kernel privilege escalation enumeration and exploitation framework☆695Updated 7 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- Socat can be used to establish a reverse shell with bash tab completion and full shell functionality☆152Updated 9 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆672Updated 6 years ago
- Git manager for pentesters☆109Updated 9 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆717Updated 6 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆464Updated last year
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆290Updated 5 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆391Updated 7 years ago
- ID-spoofing NFS client☆297Updated 5 years ago
- Padding oracle attack against PKCS7☆336Updated 2 years ago
- Docker container with tools for binary reverse engineering and exploitation.☆326Updated 4 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆396Updated 5 years ago
- cribdrag - an interactive crib dragging tool for cryptanalysis on ciphertext generated with reused or predictable stream cipher keys☆175Updated 5 years ago
- ☆144Updated 8 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆887Updated 5 years ago
- Static compiled binaries + scripts ready to use on systems☆153Updated 3 months ago
- RSA CTF Tool - Tool to attack RSA public keys and ciphertexts in common ways☆180Updated 8 years ago
- Bypassing disabled exec functions in PHP (c) CRLF☆402Updated 4 years ago
- collection of verified Linux kernel exploits☆188Updated 4 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆508Updated 3 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆211Updated 2 years ago
- Gives you root on the hostOS, if you're a member of the 'docker' group.☆204Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆244Updated 9 years ago