hughdavenport / fifty-shades-of-securityLinks
☆13Updated 11 years ago
Alternatives and similar repositories for fifty-shades-of-security
Users that are interested in fifty-shades-of-security are comparing it to the libraries listed below
Sorting:
- Hackers in yo' kernel!☆59Updated 10 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆17Updated 9 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- RFC 6238 TOTP + knockd = awesome!☆56Updated 9 years ago
- Group Management System☆42Updated 9 years ago
- Call for WPA3 - what's wrong with WPA2 security and how to fix it☆239Updated 7 years ago
- Cracks SSL PEM files that hold encrypted private keys. Brute forces or dictionary cracks. This code is extraordinarily slow, DON'T JUDGE …☆308Updated 3 years ago
- Whitelist Tor exit relays to allowing Tor users access your CloudFlare-protected site without CAPTCHA's☆63Updated 9 years ago
- A patch for cryptsetup which adds the option to nuke all keyslots given a certain passphrase.☆186Updated 6 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- The 2016 Crypto and Privacy Village Blinkybadge☆12Updated 9 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆139Updated 8 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Believe in the Right to Share. Secure, Anonymous, Free, Everywhere. Welcome to the Future of File Sharing.☆180Updated 9 years ago
- :wq☆67Updated 6 years ago
- ASUS Router infosvr UDP Broadcast root Command Execution☆251Updated 10 years ago
- A tool for predicting the output of random number generators☆194Updated 8 years ago
- Tool used to continuously monitor a Github org for mistaken public commits☆166Updated 9 years ago
- setroubleshootd xSports☆92Updated 8 years ago
- A demo of altering an opened tab after a timer☆123Updated 9 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago