mpgn / BEAST-PoC
Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389
☆68Updated 5 years ago
Related projects: ⓘ
- PoC implementation of the POODLE attack☆65Updated 9 years ago
- A simple steganalysis script writen in Python☆25Updated 10 years ago
- public exploits☆35Updated last year
- List of fuzzing resources for learning Fuzzing and initial phases of Exploit Development like root cause analysis☆93Updated 6 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- The Zulu fuzzer☆125Updated 6 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆31Updated 5 years ago
- Simple vulnerability scanning framework☆48Updated 7 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆86Updated 7 years ago
- ☆71Updated 5 years ago
- Helper scripts to assist penetration testing and exploit development☆35Updated last year
- ☆70Updated 6 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 10 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 6 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆45Updated 11 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 5 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40Updated 10 years ago
- ☆22Updated 8 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated last year
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 8 years ago
- unix wildcard attacks☆130Updated 6 years ago
- ☆78Updated 11 years ago
- Attack-Defence CTF framework that uses application containers instead of virtual machines☆49Updated 8 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆43Updated 7 years ago
- TLS Redirection☆115Updated 6 years ago
- protocol fuzzing toolkit☆125Updated 5 years ago
- A killer reverse-shell script that is able to use a lot of techniques to ensure your shell will pop back to you.☆27Updated 6 years ago
- Network based protocol fuzzer☆66Updated 2 years ago
- ☆96Updated 2 years ago