mpgn / BEAST-PoC
Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389
☆72Updated 5 years ago
Related projects ⓘ
Alternatives and complementary repositories for BEAST-PoC
- The Zulu fuzzer☆125Updated 7 years ago
- PoC implementation of the POODLE attack☆66Updated 9 years ago
- public exploits☆35Updated last year
- ☆71Updated 5 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 10 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆87Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- Network based protocol fuzzer☆68Updated 2 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆191Updated 9 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆45Updated 11 years ago
- ☆22Updated 9 years ago
- TLS Redirection☆118Updated 7 years ago
- ☆70Updated 7 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆31Updated 5 years ago
- Simple vulnerability scanning framework☆48Updated 8 years ago
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 6 years ago
- A regular expression fuzzer.☆43Updated 6 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 5 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆68Updated 8 years ago
- ☆89Updated 5 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 10 years ago
- Code Review Audit Script Scanner☆140Updated last year
- A simple steganalysis script writen in Python☆25Updated 10 years ago
- Advanced XPath Injection Tool☆32Updated 9 years ago
- some example ctf writeups☆27Updated 4 years ago
- ☆26Updated 3 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆27Updated 6 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 6 years ago