liamg / pax
CLI tool for PKCS7 padding oracle attacks
☆135Updated 4 years ago
Alternatives and similar repositories for pax:
Users that are interested in pax are comparing it to the libraries listed below
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Drupal Honeypot☆57Updated 5 years ago
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆50Updated 7 years ago
- A Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆86Updated 3 months ago
- TLS Redirection☆120Updated 7 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Updated 6 years ago
- Burp Commander written in Go☆57Updated 6 years ago
- Security Research☆95Updated 5 years ago
- try privilege escalation changing sudo command☆119Updated 7 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆133Updated 5 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- BSidesSF CTF 2019 release☆72Updated 2 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- A DNS connectback shell executed by strings in payloads.txt☆103Updated last year
- an asynchronous target enumeration tool☆243Updated 2 years ago
- BlueKeep scanner supporting NLA☆167Updated 5 years ago
- Tool that will request the public disclosures on a specific HackerOne program and show them in a localhost webserver.☆64Updated 6 years ago
- PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Or…☆96Updated 4 years ago
- rapid content discovery tool for recursively querying webservers, handy in pentesting and web application assessments☆245Updated 5 years ago
- Hawkeye filesystem analysis tool☆235Updated 6 years ago
- Linux privilege escalation via LXD☆133Updated 5 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- ☆104Updated 4 years ago
- DupeKeyInjector☆135Updated 2 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- Hunt Open MongoDB instances☆78Updated 5 years ago
- Burp with Friends☆102Updated 2 years ago