nealharris / BREACH
Tool that runs the BREACH attack demonstrated at BlackHat 2013.
☆169Updated 6 years ago
Alternatives and similar repositories for BREACH:
Users that are interested in BREACH are comparing it to the libraries listed below
- A framework for BREACH and other compression-based crypto attacks☆228Updated 5 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- Nameserver DNS poisoning attacks made easy☆517Updated 7 years ago
- Fetch, install and search exploit archives from exploit sites.☆111Updated last year
- Network based protocol fuzzer☆70Updated 2 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆164Updated last year
- Shell-style script to search exploit-db.com exploits.☆60Updated 5 months ago
- Drag and Drop ClickJacking PoC development assistance tool.☆192Updated 4 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆203Updated last year
- Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389☆73Updated 6 years ago
- An automated XSS payload generator written in python.☆319Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆116Updated 3 years ago
- ☆193Updated 6 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- unix wildcard attacks☆132Updated 6 years ago
- ssh public host key scanner using shodan☆117Updated 5 years ago
- ☆179Updated 11 years ago
- VPN pentest tools and scripts☆121Updated 7 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆80Updated 9 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago
- Burp and ZAP plugin to analyse Content-Security-Policy headers or generate template CSP configuration from crawling a Website☆138Updated 4 years ago
- ☆53Updated 8 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆122Updated 6 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆121Updated 9 years ago
- WIreless Hacking Tools☆162Updated 11 years ago
- ☆55Updated 4 years ago
- ☆140Updated 8 years ago