n3k / CertSlayer
This is a tool to instantly test if an application handles SSL certificates the way it is supposed to.
☆25Updated 2 years ago
Alternatives and similar repositories for CertSlayer:
Users that are interested in CertSlayer are comparing it to the libraries listed below
- Material from our CANAPE workshop☆32Updated 6 years ago
- js-beautifier extension for Burp Suite☆30Updated 11 years ago
- CANAPE Network Testing Tool☆33Updated 6 years ago
- simple plugin to detect shellcode on Bro IDS with Unicorn☆33Updated 8 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- The Zulu fuzzer☆125Updated 7 years ago
- ☆50Updated 8 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆30Updated 8 years ago
- An automated collection and analysis of malware from my honeypots.☆25Updated 7 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Tiny payload for transfer via LOKI - Provides high speed Virtual Channel two way file transfer capabilities☆26Updated 10 years ago
- Automatically exported from code.google.com/p/burp-extensions☆30Updated 5 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 8 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- Mixing up CVE and MS like a pro☆24Updated 7 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆66Updated 10 years ago
- Some sample code from my Zero Nights 2017 presentation.☆62Updated 7 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆41Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- Identify botnet panels with Ensembled Decision Trees☆18Updated 8 years ago
- Vulnerability research and development.☆25Updated 9 years ago
- ☆29Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- CVE-2016-1287 vulnerability test☆16Updated 9 years ago
- POC for IAT Parsing Payloads☆47Updated 8 years ago
- ☆32Updated 9 years ago