liamg / paxLinks
CLI tool for PKCS7 padding oracle attacks
☆137Updated 4 years ago
Alternatives and similar repositories for pax
Users that are interested in pax are comparing it to the libraries listed below
Sorting:
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- A toy CTF Golang Reverse Shell w/ a Tmux-driven psuedo-C2 Interface☆88Updated 2 months ago
- Security Research☆95Updated 5 years ago
- TLS Redirection☆120Updated 7 years ago
- Hawkeye filesystem analysis tool☆235Updated 6 years ago
- PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Or…☆96Updated 4 years ago
- DupeKeyInjector☆135Updated 3 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago
- Powerful Visual Subdomain Enumeration at the Click of a Mouse☆139Updated 6 years ago
- an asynchronous target enumeration tool☆244Updated 2 years ago
- A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418☆35Updated 6 years ago
- Linux privilege escalation via LXD☆134Updated 5 years ago
- HTTP.ninja☆151Updated last year
- Burp Commander written in Go☆58Updated 6 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- Words list generator to crack security tokens☆110Updated 5 years ago
- Gogs CVEs☆78Updated 5 years ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- A Burp Extension designed to identify argument injection vulnerabilities.☆121Updated 6 years ago
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆50Updated 7 years ago
- A simple embedded Linux backdoor.☆199Updated 4 years ago
- ☆126Updated 5 years ago
- An XSS reverse shell framework☆308Updated 6 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- A simple, extensible C&C beaconing system.☆101Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- A DNS connectback shell executed by strings in payloads.txt☆105Updated last year
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆104Updated 3 years ago