CRIME attack PoC : a compression oracle attacks CVE-2012-4929
☆30Mar 23, 2019Updated 6 years ago
Alternatives and similar repositories for CRIME-poc
Users that are interested in CRIME-poc are comparing it to the libraries listed below
Sorting:
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆80Jan 30, 2019Updated 7 years ago
- Minimal OpenMSP430 hardware extensions for isolation and attestation☆24May 19, 2025Updated 10 months ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆85Feb 20, 2021Updated 5 years ago
- Bypass AMSI and Executing PowerShell scripts from C# - using CyberArk's method to bypass AMSI☆31Feb 22, 2020Updated 6 years ago
- Bitcoin-and-Other-Crypto-Assets-Tracing/Recovery☆11Sep 5, 2022Updated 3 years ago
- Toy version of the sweet32 attack☆16Nov 24, 2017Updated 8 years ago
- PSHinjector autoscript is a tool that inject shellcode(x64 payload) by powershell with python3 programing☆30May 4, 2020Updated 5 years ago
- A Windows Bitcoin wallet password recovery tool☆11Nov 30, 2020Updated 5 years ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- CryptoTrojan in Python (For educational purpose ONLY)☆50Mar 23, 2018Updated 7 years ago
- ☆19Mar 23, 2025Updated 11 months ago
- Pickle decompiler plugin for Radare2☆18Aug 6, 2023Updated 2 years ago
- CTF Write-Ups☆19Jan 19, 2020Updated 6 years ago
- Many best in class pseudo random generators grouped into one simple library.☆16Jan 1, 2026Updated 2 months ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- A crypto wallet recovery tool or software is designed to help users regain access to their cryptocurrency wallets in the event of lost or…☆20Sep 8, 2024Updated last year
- Frida Python Tool☆14Sep 29, 2020Updated 5 years ago
- zksync-paymaster is a repository containing scripts and configurations for deploying and utilizing a paymaster smart contract on the zkSy…☆11Feb 24, 2024Updated 2 years ago
- testing123☆13Nov 23, 2024Updated last year
- Confluence(<install-directory>/confluence/WEB-INF/)文件读取漏洞☆17Sep 2, 2019Updated 6 years ago
- ☆13Sep 14, 2022Updated 3 years ago
- ☆12Jun 25, 2021Updated 4 years ago
- Use ICMP requests to check the alive subnet.☆23Jul 26, 2021Updated 4 years ago
- Exploit for CVE-2022-27226☆15Mar 19, 2022Updated 4 years ago
- A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes☆46Sep 2, 2023Updated 2 years ago
- Proof of concept for Weblogic CVE-2020-2883☆15May 13, 2020Updated 5 years ago
- Attack code for UHEPRNG (Ultra High Entropy Pseudo-Random Number Generator)☆11Feb 9, 2018Updated 8 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- Golang programs for AES -CBC mode encryption with HMAC-SHA256 and Padding Oracle attack on AES-CBC mode.☆12Apr 3, 2020Updated 5 years ago
- IronBee Rules☆18Dec 4, 2013Updated 12 years ago
- Black-Tool-For-Windows☆15Sep 8, 2021Updated 4 years ago
- experimenting w/ apple script for various macOS functionality☆14Aug 4, 2019Updated 6 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Aug 6, 2019Updated 6 years ago
- Fast program tracing and analysis☆17Feb 3, 2026Updated last month
- Set of tools to analyze Windows sandboxes for exposed attack surface. (Maintained V1 branch).☆18Nov 2, 2024Updated last year
- ☆15Nov 1, 2014Updated 11 years ago
- 分布式漏扫框架☆17Nov 7, 2017Updated 8 years ago
- Find wallet.dat online scraping☆14Jan 4, 2022Updated 4 years ago
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago