mpgn / BEAST-PoC
Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389
☆73Updated 6 years ago
Alternatives and similar repositories for BEAST-PoC:
Users that are interested in BEAST-PoC are comparing it to the libraries listed below
- PoC implementation of the POODLE attack☆69Updated 9 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 7 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Updated 5 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- Helper scripts to assist penetration testing and exploit development☆37Updated 4 months ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- ☆42Updated 6 years ago
- public exploits☆35Updated last year
- Exploitation challenges for CTF☆63Updated 7 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆87Updated 10 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆44Updated 11 years ago
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- ☆73Updated 6 years ago
- Simple vulnerability scanning framework☆50Updated 8 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Advanced XPath Injection Tool☆34Updated 9 years ago
- TLS Redirection☆120Updated 7 years ago
- unix wildcard attacks☆133Updated 6 years ago
- ☆91Updated 6 years ago
- ☆38Updated 4 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- Study about HQL injection exploitation.☆51Updated 8 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- A simple steganalysis script writen in Python☆26Updated 11 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 2 years ago
- A tool that enumerates Android devices for information useful in understanding its internals and for exploit development. It supports and…☆51Updated 7 years ago