mpgn / Padding-oracle-attackLinks
Padding oracle attack against PKCS7
☆333Updated 3 years ago
Alternatives and similar repositories for Padding-oracle-attack
Users that are interested in Padding-oracle-attack are comparing it to the libraries listed below
Sorting:
- ☆266Updated 6 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆264Updated 2 years ago
- Automated script for performing Padding Oracle attacks☆803Updated last year
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆220Updated 3 years ago
- A training CTF covering non-blind SQL injection techniques☆71Updated 8 years ago
- Crack the shared secret of a HS256-signed JWT☆256Updated 2 years ago
- Debian OpenSSL Predictable PRNG (CVE-2008-0166)☆410Updated 3 years ago
- Contents for Node.Js Security Course☆343Updated 5 years ago
- notes and code on past CTFs☆105Updated 4 years ago
- Contains tools for solving RSA and other crypto problems in CTFs.☆337Updated 3 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆204Updated 6 years ago
- Use HTTP Smuggling Lab to learn HTTP Smuggling.☆345Updated 3 years ago
- Script to recover mt_rand()'s seed with only two outputs and without any bruteforce.☆160Updated 6 years ago
- A cheat sheet for attacking SQLite via SQLi☆102Updated 9 years ago
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆129Updated 9 months ago
- All my infosec notes I have been building up over the years☆337Updated 11 months ago
- A tiny and cute URL fuzzer☆402Updated 3 years ago
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆683Updated 6 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 3 years ago
- Some of my exploits.☆598Updated 4 years ago
- ☆1,177Updated last year
- Herramienta para evadir disable_functions y open_basedir☆487Updated 2 years ago
- Simple DNS Rebinding Service☆721Updated 6 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆732Updated 6 years ago
- Shellshock exploit + vulnerable environment☆227Updated 2 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,037Updated 4 years ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competition☆102Updated 5 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆298Updated 2 years ago
- Try to find the password of a file that was encrypted with the 'openssl' command.☆233Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago