robertdavidgraham / heartleech
Demonstrates the "heartbleed" problem using full OpenSSL stack
☆701Updated 8 years ago
Alternatives and similar repositories for heartleech:
Users that are interested in heartleech are comparing it to the libraries listed below
- Published security vulnerabilities, research, and associated information.☆137Updated 5 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆196Updated 8 years ago
- SSLStrip version to defeat HSTS☆316Updated 7 years ago
- Wolves Among the Sheep☆147Updated last year
- A regex based source code scanner.☆129Updated 7 years ago
- ☆137Updated 6 years ago
- Probably one of the smallest SSL MITM proxies you can make☆182Updated 9 years ago
- proxy poc implementation of STARTTLS stripping attacks☆167Updated 3 years ago
- ☆137Updated 3 years ago
- Visual Basic GUI: A Tool to Inject Keystrokes on a SSH Client via an X11 Forwarded Session☆64Updated 6 years ago
- Exploit Pack for Metasploit - Collection of modules gathered across time and internets☆242Updated 10 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- This is a mini-firewall that completely isolates a target device from the local network.☆305Updated 11 years ago
- The ONLY hacker friendly proxy for webapp pentests.☆216Updated 8 years ago
- ☆378Updated 12 years ago
- A Proof of Concept for the POODLE vulnerability in SSLv3☆78Updated 9 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 7 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆457Updated last year
- Password Hash Identification☆219Updated 11 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆135Updated 7 years ago
- The first open source vulnerability scanner for firmwares☆194Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60Updated 9 years ago
- a linux process hacker tool☆83Updated 5 years ago
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- Abstracts and expedites the process of backdooring stock firmware images for consumer/SOHO routers☆122Updated 11 years ago
- Linux Memory Cryptographic Keys Extractor☆235Updated last year
- BlackNurse attack PoC☆171Updated 8 years ago
- ☆191Updated 7 years ago