nealharris / BREACHLinks
Tool that runs the BREACH attack demonstrated at BlackHat 2013.
☆171Updated 7 years ago
Alternatives and similar repositories for BREACH
Users that are interested in BREACH are comparing it to the libraries listed below
Sorting:
- Network based protocol fuzzer☆75Updated 3 years ago
- ☆181Updated 12 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆168Updated 2 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆81Updated 10 years ago
- A Blind SQL Exploitation application☆79Updated 13 years ago
- Exploits and research stuffs☆54Updated 2 months ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago
- proxy poc implementation of STARTTLS stripping attacks☆170Updated 4 years ago
- Rogue AP killer☆92Updated 7 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- ☆75Updated 11 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆86Updated 11 years ago
- ☆148Updated 9 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆48Updated 3 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Tool to help identify timing attacks☆70Updated 14 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆107Updated 11 years ago
- BurpJDSer-ng☆29Updated 2 weeks ago
- unix wildcard attacks☆136Updated 7 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆125Updated last year
- A static-code-analysis tool for performing security-focused code reviews. It enables an auditor to swiftly map the attack-surface of a la…☆141Updated last year
- Operational toolset utilizing git's submodule feature☆57Updated 12 years ago
- Test a network's egress controls with various levels of success and failure.☆105Updated 3 years ago
- A tool to generate media files with malicious metadata☆127Updated 6 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- DNS zone transfer research☆59Updated 9 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated last year