seb-m / jpakeLinks
Small-subgroup confinement issue in the OpenSSL and OpenSSH implementations of J-PAKE.
☆23Updated 14 years ago
Alternatives and similar repositories for jpake
Users that are interested in jpake are comparing it to the libraries listed below
Sorting:
- ☆13Updated 11 years ago
- Exploiting Edge's read:// urlhandler☆15Updated 3 years ago
- A novel rootkit under linux(test under cents 5.4) combine with preload_inject and sys_table modify☆19Updated 11 years ago
- CVE-2017-11882 File Generator PoC☆35Updated 7 years ago
- Exploits used on hacking CTF's☆28Updated 5 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Updated 8 years ago
- ☆6Updated 8 years ago
- CVE-2017-9791☆27Updated 8 years ago
- cross site scripting framework plugin for metasploit☆17Updated 12 years ago
- My metasploit modules☆11Updated 10 years ago
- 一个攻击框架☆10Updated 10 years ago
- ☆17Updated 7 years ago
- Slides & Video Demos of My Talk Titled Browser Exploits? Grab ’em by the Collar! @ Brucon0x09☆1Updated 7 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Updated 12 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆11Updated 6 years ago
- 3.8.x - 4.2.3 ForumRunner (vBulletin) exploit Proof of Concept☆38Updated 7 years ago
- [Windows] Local Privilege Escalation - WebClient☆58Updated 8 years ago
- DNS TCP to UDP proxy☆9Updated 10 years ago
- Microsoft Office / COM Object DLL Planting☆15Updated 9 years ago
- PowerShell module for the exploitation and testing☆16Updated 10 years ago
- Proof-of-Concept exploits for D-Link DIR8xx routers☆37Updated 7 years ago
- MS17-010 multithreading scanner written in python.☆75Updated 8 years ago
- Set of useful scrpts☆10Updated 10 years ago
- Juniper backdoor☆14Updated 9 years ago
- lkm rootkit☆15Updated 11 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- An LKM rootkit targeting Linux 2.6/3.x on x86(_64), and ARM☆28Updated 10 years ago
- ☆22Updated 9 years ago
- Code, commands, and chatter about Threat Hunting.☆35Updated 5 years ago
- Java Untrusted Deserialization Exploits Tools☆67Updated 9 years ago