Demonstrate how to use a padding oracle to break AES-CBC encrypted ciphertext (as seen on poodle).
☆17Nov 20, 2014Updated 11 years ago
Alternatives and similar repositories for aes_padding_oracle_attack
Users that are interested in aes_padding_oracle_attack are comparing it to the libraries listed below
Sorting:
- ☆15Oct 8, 2025Updated 4 months ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- LD_PRELOAD library for intercepting the plain text of SSL connections made with openssl☆24Dec 15, 2014Updated 11 years ago
- A method for building LinuxKit images for Docker-CE with custom kernels.☆21Aug 3, 2023Updated 2 years ago
- ☆68Aug 1, 2017Updated 8 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆27Feb 1, 2019Updated 7 years ago
- Diem (formerly Libra) Move VM decompiler plugin for JEB☆33Nov 1, 2023Updated 2 years ago
- Material from our CANAPE workshop☆32Nov 26, 2018Updated 7 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Hardening Tool for *nixes☆50Apr 22, 2017Updated 8 years ago
- Certificate Revocation List monitor☆48Aug 6, 2024Updated last year
- Scripts that we use for pentesting☆42Feb 24, 2017Updated 9 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ☆21Sep 5, 2018Updated 7 years ago
- Resources for the Kubernetes Fundamentals course.☆13Jan 14, 2025Updated last year
- ☆12Sep 15, 2025Updated 5 months ago
- A simple script to be used as AuthorizedKeysCommand in OpenSSH server to look up user’s public keys in LDAP.☆14Dec 28, 2016Updated 9 years ago
- Cloud-Z gathers performance related information and benchmarks on cloud instances with support for multiple cloud providers.☆15Feb 18, 2023Updated 3 years ago
- Code samples of querying the API services of Whois XML Api.☆12Dec 14, 2023Updated 2 years ago
- Auto-deploy to GitHub using WP2Static☆11May 18, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- The frontend app of Mailcow's CowUI web interface☆12Apr 29, 2024Updated last year
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Dec 17, 2021Updated 4 years ago
- Secure approach to secure file storage in untrusted environments.☆35Mar 26, 2019Updated 6 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- perl, non-alphanumeric, php☆10Mar 16, 2017Updated 8 years ago
- wannabe (up-to-date) 64bit port of lguest☆14May 11, 2011Updated 14 years ago
- Robot Framework Introduction slide set☆15May 25, 2016Updated 9 years ago
- tfa is a 2fa cli tool that aims to help you to generate 2fa code on CI/CD pipelines.☆28Oct 26, 2021Updated 4 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Azure monitoring module for Zabbix☆10Jan 30, 2025Updated last year
- DEPRECATED: Tool for checking data leaks of social media platforms☆10Feb 20, 2022Updated 4 years ago