mpgn / CRIME-pocLinks
 CRIME attack PoC : a compression oracle attacks CVE-2012-4929 
☆30Updated 6 years ago
Alternatives and similar repositories for CRIME-poc
Users that are interested in CRIME-poc are comparing it to the libraries listed below
Sorting:
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆77Updated 6 years ago
 - Words list generator to crack security tokens☆110Updated 5 years ago
 - ☆53Updated last year
 - Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆93Updated 6 years ago
 - Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆49Updated 4 years ago
 - A collection of darkc0de old scripts (for education purposes only)☆86Updated 9 years ago
 - [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆35Updated 6 years ago
 - A number of scripts POC's and problems solved as pentests move along.☆44Updated last year
 - EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
 - OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).☆153Updated 5 years ago
 - A Cross Site Scripting scanner using selenium webdriver☆54Updated 6 years ago
 - Hunt Open MongoDB instances☆79Updated 6 years ago
 - XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 6 years ago
 - This is a concept poc of command and control server implemented over blockchain☆54Updated 6 years ago
 - API testing tool written with Python☆56Updated 8 years ago
 - Linux Privilege Escalation Tool☆185Updated 6 years ago
 - Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆84Updated 4 years ago
 - ☆73Updated 6 years ago
 - Red Team Resources☆60Updated 6 years ago
 - The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
 - Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
 - A tool to evaluate Content Security Policies.☆71Updated 5 years ago
 - The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
 - ☆15Updated 2 years ago
 - Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
 - Asynchronous wordlist based DKIM scanner☆58Updated 4 years ago
 - A Framework for Comparing Password Guessing Strategies☆128Updated 6 years ago
 - This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
 - An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
 - CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check☆25Updated 5 years ago