mpgn / poodle-PoCLinks
Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566
☆257Updated last year
Alternatives and similar repositories for poodle-PoC
Users that are interested in poodle-PoC are comparing it to the libraries listed below
Sorting:
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- All my infosec notes I have been building up over the years☆336Updated 4 months ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- ☆207Updated 4 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆283Updated 10 years ago
- Linux post exploitation enumeration and exploit checking tools☆180Updated 5 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- An exploit for Apache Struts CVE-2018-11776☆302Updated 6 years ago
- Search Exploitable Software on Linux☆230Updated 2 years ago
- ☆219Updated 3 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆258Updated 2 months ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆161Updated 11 years ago
- Local File Inclusion Exploitation Tool (mirror)☆128Updated 8 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆391Updated 7 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 2 years ago
- ☆265Updated 6 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆316Updated 2 weeks ago
- Penetration testing scripts☆143Updated 7 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆355Updated 4 months ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆290Updated 2 years ago
- Damn Vulnerable Thick Client App☆150Updated 5 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆195Updated 5 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆211Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- DNS Rebinding Exploitation Framework☆489Updated 4 years ago
- An SNMPv3 User Enumerator and Attack tool☆254Updated 4 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆174Updated last year
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆889Updated 5 years ago
- XXE Out of Band Server.☆170Updated last year