This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.
☆25Mar 17, 2023Updated 2 years ago
Alternatives and similar repositories for CertSlayer
Users that are interested in CertSlayer are comparing it to the libraries listed below
Sorting:
- Tools for timing attacks☆19Oct 19, 2015Updated 10 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- Automated GUI testing utility developed for Marvin-dynamic-analyzer.☆16Feb 17, 2016Updated 10 years ago
- Inspired by gowitness and EyeWitness☆15Mar 11, 2025Updated 11 months ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Jun 24, 2016Updated 9 years ago
- Simple php backdoor based on extension☆22Feb 12, 2015Updated 11 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Apr 13, 2020Updated 5 years ago
- Cli interface to threatcrowd.org☆20Jul 6, 2017Updated 8 years ago
- Breaking the security of Microsoft's RMS☆56Aug 5, 2019Updated 6 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Jan 8, 2019Updated 7 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Repository for the wireshark plugin development project of the AMOS 16 course☆10Jan 6, 2017Updated 9 years ago
- a GUI Interface for DFIR Open Source Tools☆10Jun 16, 2015Updated 10 years ago
- Imports IP address and CIDR information into a SQLite Database format☆15Feb 25, 2026Updated last week
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- DEPRECATED USE v3!☆59Sep 8, 2015Updated 10 years ago
- Exploit WinIo - Vidix and Run Shellcode in Windows Kerne ( local Privilege escalation )☆28Aug 30, 2015Updated 10 years ago
- Python Process Injection PoC Code from my SteelCon talk in 2014☆60Aug 7, 2014Updated 11 years ago
- Distributing the REconstruction of High-Level IR for Large Scale Malware Analysis☆65Sep 15, 2015Updated 10 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- Extension of SMBLibrary for RPC calls☆35Jun 11, 2024Updated last year
- Purposely vulnerable ActiveX Control to teach about exploitation in a browser-based environment.☆71Dec 5, 2014Updated 11 years ago
- Cuckoo Sandbox Local Maltego Transforms Project☆49Jul 2, 2014Updated 11 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Curso optativo de Deep Learning para UNICEN☆11Aug 25, 2021Updated 4 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- ☆12Oct 1, 2024Updated last year
- Work Fast With the pattern matching swiss knife for malware researchers.☆38Mar 26, 2016Updated 9 years ago
- YAPDNS☆39Jun 19, 2015Updated 10 years ago
- lte security☆42Nov 17, 2015Updated 10 years ago
- Recurse through a registry, identifying values with large data -- a registry malware hunter☆45Sep 12, 2016Updated 9 years ago
- A simple toolkit on extracting RSA Software Tokens from RSA SecureID☆42May 6, 2020Updated 5 years ago
- A few Clio examples☆14Oct 11, 2021Updated 4 years ago
- Slack post-exploitation script for leaked bot tokens and "d" cookies☆17Nov 18, 2025Updated 3 months ago
- Dockerized TOR socks5☆10Jul 15, 2018Updated 7 years ago
- Simple go package to tail log remotely.☆10Feb 14, 2017Updated 9 years ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- Go汇编语言简介☆13Aug 14, 2024Updated last year
- ☆10May 30, 2015Updated 10 years ago