nealharris / BREACHLinks
Tool that runs the BREACH attack demonstrated at BlackHat 2013.
☆170Updated 7 years ago
Alternatives and similar repositories for BREACH
Users that are interested in BREACH are comparing it to the libraries listed below
Sorting:
- Network based protocol fuzzer☆75Updated 3 years ago
- Tool to help identify timing attacks☆70Updated 14 years ago
- ☆75Updated 11 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆169Updated 2 years ago
- proxy poc implementation of STARTTLS stripping attacks☆171Updated 4 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆209Updated 2 years ago
- unix wildcard attacks☆136Updated 7 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated last year
- Exploits and research stuffs☆55Updated last month
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 9 years ago
- CLI crypto swiss-army knife for performing and composing encoding, decoding, encryption, decryption, hashing, and other various cryptogra…☆118Updated 7 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 10 years ago
- Automatically exported from code.google.com/p/yaptest☆67Updated 3 years ago
- VOIP Security Audit Framework☆108Updated 7 years ago
- A tool to generate media files with malicious metadata☆127Updated 6 years ago
- A Blind SQL Exploitation application☆79Updated 13 years ago
- A public list of URLs generally useful to webapp testers and pentesters☆112Updated 8 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆118Updated 4 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- Simple REST-style web service for the CVE searching☆97Updated 2 years ago
- DNS zone transfer research☆59Updated 9 years ago
- Search exploits in multiple exploit databases!☆85Updated 5 years ago
- Passive Vulnerability Auditor☆135Updated 9 years ago
- Tools for 802.11 information gathering.☆120Updated 3 years ago
- ☆54Updated 9 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Wi-Fi Scan Visualizer by Pentester Academy☆58Updated 10 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago