matiasinsaurralde / evilredis
Script for doing evil stuff to Redis servers (for educational purposes only).
☆71Updated 8 years ago
Alternatives and similar repositories for evilredis:
Users that are interested in evilredis are comparing it to the libraries listed below
- ☆78Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- The databases, API's and managers behind https://websecweekly.org☆50Updated 10 years ago
- Hunt for vulnerable websites as you browse.☆131Updated 8 years ago
- A demo of altering an opened tab after a timer☆123Updated 8 years ago
- ☆22Updated 9 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆35Updated 7 years ago
- Reverse proxy for HTTPS services, with SSL verification.☆60Updated last year
- ☆71Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- A shitty attempt at a honeypot/sandbox that uses docker☆22Updated 8 years ago
- A mass subdomain (Subbrute) + poodle vulnerability scanner☆74Updated 6 years ago
- An implementation of the hashcat rules engine in javascript☆48Updated 7 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- Live at http://extractdata.club☆167Updated 8 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Updated 8 years ago
- Self contained cross platform DNS recon tool☆187Updated 7 years ago
- A docker based honeypot.☆149Updated 10 years ago
- Capture the Flag: Web Edition https://stripe.com/blog/capture-the-flag-20☆276Updated 9 years ago
- Watchtower is a Static Code Analysis tool designed to assist security auditors who are tasked with performing manual code reviews. It is …☆111Updated 7 years ago
- ☆56Updated 7 years ago
- A multi service threaded MD5 cracker☆66Updated 8 years ago
- Vulnerable Web applications Generator☆84Updated 7 years ago
- Universal MITM web server☆107Updated 8 years ago
- Using serverless functions to provide an API for checking potential passwords against an enormous corpus of passwords leaked from securit…☆113Updated 7 years ago
- ☆74Updated 12 years ago
- Satellite: Measuring The Internet's Stars☆38Updated 4 years ago
- Docker container to run PoisonTap☆15Updated 8 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆209Updated 9 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago