nealharris / BREACH
Tool that runs the BREACH attack demonstrated at BlackHat 2013.
☆169Updated 6 years ago
Alternatives and similar repositories for BREACH:
Users that are interested in BREACH are comparing it to the libraries listed below
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆165Updated last year
- ☆180Updated 11 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- Network based protocol fuzzer☆70Updated 3 years ago
- Fetch, install and search exploit archives from exploit sites.☆113Updated last year
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- ☆53Updated 8 years ago
- A HackerOne API client for Python☆19Updated 7 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- unix wildcard attacks☆131Updated 6 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A very simple bridge for performing Flash HTTP requests with JavaScript☆79Updated 9 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- Nameserver DNS poisoning attacks made easy☆519Updated 8 years ago
- A framework for BREACH and other compression-based crypto attacks☆229Updated 5 years ago
- Passive Vulnerability Auditor☆132Updated 8 years ago
- VOIP Security Audit Framework☆108Updated 7 years ago
- The OWASP AppSec Browser Bundle is an open source Linux based penetration testing browser bundle built over Mozilla Firefox. It comes pre…☆96Updated 11 years ago
- ☆55Updated 4 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- MalQR is a collection of malicious QR Codes and Barcodes you can use to test the security of your scanners.☆122Updated 11 months ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 10 months ago
- Analysis Suite For EAP Enabled Wireless Networks☆123Updated 6 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- Exploits and research stuffs☆54Updated last year
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆275Updated 4 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆93Updated 7 years ago