seb-m / jpakeLinks
Small-subgroup confinement issue in the OpenSSL and OpenSSH implementations of J-PAKE.
☆23Updated 15 years ago
Alternatives and similar repositories for jpake
Users that are interested in jpake are comparing it to the libraries listed below
Sorting:
- ☆13Updated 11 years ago
- CVE-2017-9791☆27Updated 8 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 8 years ago
- My metasploit modules☆11Updated 10 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Updated 7 years ago
- Exploiting Edge's read:// urlhandler☆15Updated 4 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 8 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 12 years ago
- Exploits used on hacking CTF's☆28Updated 6 years ago
- Set of useful scrpts☆10Updated 11 years ago
- 一个攻击框架☆10Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 8 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 12 years ago
- ☆17Updated 8 years ago
- cross site scripting framework plugin for metasploit☆17Updated 13 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Updated 7 years ago
- ☆10Updated 7 years ago
- Remote Desktop Protocol in Twisted Python☆26Updated 7 years ago
- PowerShell module for the exploitation and testing☆16Updated 10 years ago
- The Horrific Omnipotent Rootkit☆23Updated 8 years ago
- Customize Exploit Codes.☆18Updated 9 years ago
- simple rootkit for computer security class☆14Updated 13 years ago
- Juniper backdoor☆14Updated 10 years ago
- Zyklon H.T.T.P Remote Administration Tool - Control Panel leaked☆16Updated 8 years ago
- ☆22Updated 9 years ago
- 3.8.x - 4.2.3 ForumRunner (vBulletin) exploit Proof of Concept☆38Updated 8 years ago
- This tool will extract the opcodes from the .text section and display in different hex formats for different syntaxes. Works only with va…☆16Updated 9 years ago
- A modular distributed penetration testing tool.☆41Updated 9 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Updated 8 years ago