Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).
☆17Nov 20, 2014Updated 11 years ago
Alternatives and similar repositories for aes_padding_oracle_attack
Users that are interested in aes_padding_oracle_attack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python crawler for remote Windows shares☆12Nov 29, 2015Updated 10 years ago
- A small python library for exploiting simple chosen-plaintext attacks.☆40May 3, 2014Updated 11 years ago
- A python module that monkey patches pexpect mainly for binary transfers.☆18Feb 28, 2019Updated 7 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- Execute shellcode and evade AV detection with python.☆15Oct 8, 2015Updated 10 years ago
- Outdated. See https://github.com/saleae/jtag-analyzer for the official Saleae JTAG Analyzer☆12May 21, 2018Updated 7 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Your perfect recognition for HTMLi and XSS☆19Oct 14, 2024Updated last year
- ☆16Oct 8, 2025Updated 5 months ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Dec 15, 2014Updated 11 years ago
- An Asp.Net Core middleware library for recording http requests and replaying them by means of the recorded playback identifier☆13Feb 20, 2026Updated last month
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Fun with the TLS handshake☆31Jun 8, 2014Updated 11 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Black Box Fuzzing(Bluetooth)☆10Apr 26, 2016Updated 9 years ago
- Diem (formerly Libra) Move VM decompiler plugin for JEB☆34Nov 1, 2023Updated 2 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- a powerful tool designed to automate the detection of Server-Side Request Forgery (SSRF) and Open Redirect vulnerabilities☆22Oct 15, 2024Updated last year
- Some materials and sample source for RV32 OS projects.☆22May 31, 2022Updated 3 years ago
- A ptrace based sandbox. (PoC)☆14Jun 3, 2018Updated 7 years ago
- ☆68Aug 1, 2017Updated 8 years ago
- CVE-2022-39227 : Proof of Concept☆22Mar 19, 2024Updated 2 years ago
- 研究成果/论文公开☆15Mar 6, 2019Updated 7 years ago
- Fork of https://github.com/androguard/androguard w/ bug fixes tests☆15Jan 13, 2022Updated 4 years ago
- Nonce reuse attacks for AEAD ciphers, especially for the the most commonly used `ChaCha20-Poly1305` and `AES-GCM`.☆22Nov 7, 2024Updated last year
- A telegram bot to verify the DGC/DCC QR Code☆16Oct 26, 2021Updated 4 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Saleae ARM Serial Wire Debug (SWD) Analyzer☆19Jul 2, 2025Updated 8 months ago
- ☆17May 29, 2015Updated 10 years ago
- Download and Execute PowerShell scripts on remote hosts with ease.☆24Jul 11, 2015Updated 10 years ago
- Secure File Transfer via Global Socket Bounce Network☆25Mar 23, 2021Updated 5 years ago
- uClinux for Cortex-M3 and Cortex-M4☆12Feb 23, 2015Updated 11 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- ☆14Aug 14, 2025Updated 7 months ago
- Heap exploitation technique bypassing heap ASLR☆49Sep 2, 2019Updated 6 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago