mpgn / poodle-PoCLinks
Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566
☆264Updated 2 years ago
Alternatives and similar repositories for poodle-PoC
Users that are interested in poodle-PoC are comparing it to the libraries listed below
Sorting:
- A tool to find and exploit servers vulnerable to Shellshock☆328Updated 2 years ago
- All my infosec notes I have been building up over the years☆337Updated 11 months ago
- ☆266Updated 6 years ago
- ☆208Updated 4 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆260Updated 4 years ago
- DNS Rebinding Exploitation Framework☆495Updated 4 years ago
- Linux post exploitation enumeration and exploit checking tools☆182Updated 5 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 8 months ago
- Search Exploitable Software on Linux☆234Updated 2 years ago
- An exploit for Apache Struts CVE-2018-11776☆303Updated 7 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆426Updated 5 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆206Updated last year
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆297Updated 6 years ago
- Local File Inclusion Exploitation Tool (mirror)☆128Updated 8 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆298Updated 10 years ago
- Test for SSL heartbeat vulnerability (CVE-2014-0160)☆167Updated 11 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆84Updated 4 years ago
- Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution☆394Updated 8 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆209Updated 3 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆278Updated 7 years ago
- SHELLING - a comprehensive OS command injection payload generator☆110Updated 6 years ago
- An SNMPv3 User Enumerator and Attack tool☆260Updated 5 years ago
- Containing Self Made Perl Reproducers / PoC Codes☆198Updated 5 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆320Updated 7 months ago
- Burp extension to perform Java Deserialization Attacks☆216Updated 2 years ago
- SambaCry exploit and vulnerable container (CVE-2017-7494)☆381Updated 3 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆298Updated 2 years ago
- XPath injection tool☆403Updated 3 years ago