nealharris / BREACH
Tool that runs the BREACH attack demonstrated at BlackHat 2013.
☆169Updated 6 years ago
Alternatives and similar repositories for BREACH:
Users that are interested in BREACH are comparing it to the libraries listed below
- ☆198Updated 9 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆165Updated last year
- Network based protocol fuzzer☆70Updated 3 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆193Updated 9 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 2 years ago
- ☆180Updated 11 years ago
- ☆89Updated 7 years ago
- Tool to help identify timing attacks☆69Updated 13 years ago
- Shell script that runs on UNIX systems (tested on Solaris 9, HPUX 11, various Linux distributions, FreeBSD 6.2). It detects misconfigurat…☆86Updated 8 years ago
- Tool for abusing XSS vulnerabilities on Wordpress and Joomla! installations☆72Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆62Updated 8 years ago
- DNS zone transfer research☆58Updated 8 years ago
- Search exploits in multiple exploit databases!☆81Updated 4 years ago
- ☆53Updated 8 years ago
- ☆92Updated 6 years ago
- ☆76Updated 10 years ago
- A Blind SQL Exploitation application☆79Updated 12 years ago
- An automated XSS payload generator written in python.☆315Updated 8 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- Project "Flashbang" - An open-source Flash-security helper☆205Updated 9 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆157Updated 6 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- Tools for 802.11 information gathering.☆119Updated 2 years ago
- Additional modules for recon-ng☆104Updated 7 years ago
- Passive Vulnerability Auditor☆130Updated 8 years ago
- Tool to help with the exploitation of web application race conditions☆181Updated 6 years ago
- Web recon tool (find temporary files, parse robots.txt, search some folders, google dorks and search domains hosted on same server)☆104Updated 8 years ago
- Drag and Drop ClickJacking PoC development assistance tool.☆194Updated 4 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- Shodan HQ nmap plugin - passively scan targets☆152Updated 9 years ago