hypnosec / evil-repoLinks
"><script>prompt(1)</script>''"><!--<svg>
☆16Updated 9 years ago
Alternatives and similar repositories for evil-repo
Users that are interested in evil-repo are comparing it to the libraries listed below
Sorting:
- a mass web screenshot tool for mapping web networks.☆24Updated 10 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- ☆12Updated 8 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- Remotely accessible Tor hidden service deployment suite☆24Updated 6 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- CVE-2015-3152 PoC☆43Updated 10 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Advanced HTTP fingerprinting PoC☆46Updated 8 years ago
- Searches for interesting cached DNS entries.☆55Updated 11 years ago
- Tor relay nearest neighbour ranking☆10Updated 3 years ago
- python tor client☆27Updated 9 years ago
- Reference implementation and job creation tool for cracking DES using the crack.sh service☆23Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 9 years ago
- Detect passive activity in the Tor-network☆13Updated 10 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 10 years ago
- Exploits and research stuffs☆55Updated last year
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- Collection of somewhat useful stuff for CTF events☆36Updated 10 years ago
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Updated 8 years ago
- A command line Hash Identifying tool.☆101Updated 6 years ago
- Python SDK to access the vulnerability database☆22Updated 5 years ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Updated 10 years ago
- ☆15Updated 8 years ago
- Repository for proxenet plugins☆14Updated 9 years ago
- HMAC timing attack's w/ statistical analysis☆23Updated 11 years ago