mpgn / BEAST-PoCLinks
Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389
☆73Updated 6 years ago
Alternatives and similar repositories for BEAST-PoC
Users that are interested in BEAST-PoC are comparing it to the libraries listed below
Sorting:
- A simple steganalysis script writen in Python☆26Updated 11 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Updated 5 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 7 years ago
- PoC implementation of the POODLE attack☆68Updated 10 years ago
- ☆38Updated 4 years ago
- Repository to host scripts discussed in https://www.notsosecure.com/crafting-way-json-web-tokens/☆15Updated 6 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- public exploits☆35Updated 2 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆51Updated 8 years ago
- ☆92Updated 6 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆102Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆28Updated 7 years ago
- ☆42Updated 6 years ago
- Helper scripts to assist penetration testing and exploit development☆36Updated 6 months ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Pentest Scripts for Apache Vulnerabilities☆31Updated 7 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- ☆71Updated 7 years ago
- Simple vulnerability scanning framework☆51Updated 8 years ago
- ☆74Updated 6 years ago
- Advanced virtual host bruteforcer☆31Updated 9 years ago
- TLS Redirection☆120Updated 7 years ago
- Study about HQL injection exploitation.☆51Updated 9 years ago
- Writeups for CTF competitions.☆33Updated 9 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago