koto / blog-kotowicz-net-examples
Code Examples for blog.kotowicz.net
☆135Updated 8 years ago
Alternatives and similar repositories for blog-kotowicz-net-examples:
Users that are interested in blog-kotowicz-net-examples are comparing it to the libraries listed below
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- A PoC for exploiting Guzzle's HTTP_PROXY untrusted read☆54Updated 8 years ago
- A security tool to fingerprint PNG libraries used by web applications☆80Updated 5 years ago
- 🔥 A checker site for MS15-034 / CVE-2015-1635☆38Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- XSS exploitation tool - access victims through HTTP proxy☆159Updated 11 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆112Updated 7 years ago
- retire.js has a new home☆20Updated 9 years ago
- Project "Flashbang" - An open-source Flash-security helper☆206Updated 10 years ago
- ☆71Updated 9 years ago
- A hacked together PHP shell designed to be stealthy and portable☆52Updated 11 years ago
- service to check internet accessibility☆42Updated 11 months ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆79Updated 9 years ago
- ☆56Updated 7 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 10 years ago
- ☆181Updated 11 years ago
- Security scanner to find temporary config files that contain passwords on public websites☆73Updated 13 years ago
- Hashcrack.org GPU-accelerated password cracker☆84Updated 9 years ago
- Examples from The Hitchhiker's Guide To Cross-Site Scripting (XSS)☆44Updated 12 years ago
- Grab files matching a search specification from Github☆110Updated 4 years ago
- ☆137Updated 7 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- SSRF Protection Library for PHP - http://safecurl.fin1te.net☆73Updated last year
- ☆74Updated 12 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- Tool that runs the BREACH attack demonstrated at BlackHat 2013.☆170Updated 6 years ago
- Password Hash Identification☆220Updated 11 years ago
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago