mpgn / BEAST-PoC
Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389
☆72Updated 5 years ago
Alternatives and similar repositories for BEAST-PoC:
Users that are interested in BEAST-PoC are comparing it to the libraries listed below
- PoC implementation of the POODLE attack☆69Updated 9 years ago
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/☆15Updated 6 years ago
- public exploits☆35Updated last year
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Updated 5 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆87Updated 7 years ago
- ☆22Updated 9 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆44Updated 11 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated last month
- Network based protocol fuzzer☆69Updated 2 years ago
- ☆42Updated 6 years ago
- A simple steganalysis script writen in Python☆25Updated 11 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 10 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- Simple vulnerability scanning framework☆50Updated 8 years ago
- Exploits and research stuffs☆54Updated last year
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆95Updated 7 years ago
- TLS Redirection☆118Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 10 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆27Updated 7 years ago
- ☆89Updated 6 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆43Updated 7 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆68Updated 8 years ago
- Published vulnerabilities and exploits.☆55Updated last year
- protocol fuzzing toolkit☆125Updated 5 years ago
- SPIKE is a protocol fuzzer creation kit. It provides an API that allows a user to create their own fuzzers for network based protocols us…☆81Updated 7 years ago
- The Zulu fuzzer☆126Updated 7 years ago