iSECPartners / LibTech-Auditing-Cheatsheet
☆198Updated 8 years ago
Related projects: ⓘ
- iSEC Partners' research publications☆76Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆47Updated 9 years ago
- A tool for netpens.☆29Updated 5 years ago
- ☆32Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆27Updated 7 years ago
- Store Burp data and collaborate via git☆54Updated 4 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- ☆111Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- Testing/collecting some container breakouts☆93Updated 5 years ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆63Updated 7 years ago
- Portcullis Computer Security Co-ordinated Disclosure Toolkit☆24Updated 4 years ago
- Monitoring 'DNS' inside the Tor network☆91Updated 7 years ago
- A regex based source code scanner.☆128Updated 7 years ago
- ☆45Updated 7 years ago
- ☆88Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- service to check internet accessibility☆41Updated 4 months ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- A test framework for testing SSL/TLS client certificate validation.☆95Updated 3 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- ☆87Updated 3 months ago
- Exploits and research stuffs☆52Updated last year
- ☆52Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 8 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Puny Domain Name Check☆36Updated 5 years ago
- List of penetration testing tools.☆23Updated 4 years ago