Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389
☆80Jan 30, 2019Updated 7 years ago
Alternatives and similar repositories for BEAST-PoC
Users that are interested in BEAST-PoC are comparing it to the libraries listed below
Sorting:
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆263Oct 6, 2023Updated 2 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆85Feb 20, 2021Updated 5 years ago
- ☆18Dec 16, 2023Updated 2 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- Shodanwave - Netwave IP Camera☆18Nov 18, 2017Updated 8 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Apr 18, 2013Updated 12 years ago
- ☆11Oct 4, 2018Updated 7 years ago
- Unofficial mirror of GNUK's submodule: Chopstx☆12Aug 15, 2020Updated 5 years ago
- Go Library (and program) to perform pairwise gcd on batches of RSA moduli☆11Apr 14, 2015Updated 10 years ago
- CRIME attack PoC : a compression oracle attacks CVE-2012-4929☆30Mar 23, 2019Updated 6 years ago
- A program that descrypts C type declarations. Implemented as an exercise for "Expert C Programming" book.☆12Aug 16, 2015Updated 10 years ago
- A realistic windows testlab deployment tool☆12Feb 24, 2017Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Binary Ninja plugin for restoring function names from stripped Golang binaries☆14Oct 19, 2020Updated 5 years ago
- Scripts to automatically create VM images☆15Oct 4, 2025Updated 4 months ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Some RSA attacks with sage☆11Nov 15, 2016Updated 9 years ago
- RFC Dependency Graphing Tool☆13Jan 5, 2024Updated 2 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- Apache Tomcat Remote Code Execution on Windows - CGI-BIN☆80Apr 17, 2019Updated 6 years ago
- A malware payload generator that can bypass almost all antivirus. It can bypass signature detection and heuristics.☆16Mar 28, 2023Updated 2 years ago
- An example in C# for programmatically calling UAC to escalate to admin☆14Aug 13, 2018Updated 7 years ago
- A Python PoC for CVE-2018-9206☆13Oct 22, 2018Updated 7 years ago
- A generic decorator based ssh protocol message fuzzer based paramiko the Native Python SSHv2 protocol library☆13Jan 2, 2020Updated 6 years ago
- Looks up permissions within Active Directory on a target (OU or Computer) to determine access to LAPS attributes (ms-Mcs-AdmPwdExpiration…☆16May 31, 2023Updated 2 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Scan4all Pro,Distributed, more optimized and faster☆13Oct 15, 2022Updated 3 years ago
- .NET Farmework Library for Facebook Messenger Bot☆13Apr 5, 2017Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiat…☆39Jul 24, 2014Updated 11 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- Python script to exploit CVE-2015-4852.☆31Jul 20, 2016Updated 9 years ago
- A fileless Windows keylogger that exfils via DNS.☆32Apr 21, 2017Updated 8 years ago
- Automatically exported from code.google.com/p/fuzzdb☆14Jun 23, 2015Updated 10 years ago
- A simple tool to extract JFFS2 image files☆18Aug 1, 2023Updated 2 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago