setuid0-sec / Swiss_E-Voting_Publications
Our publications of the Swiss E-Voting Public Intrusion Test (PIT)
☆47Updated 6 years ago
Alternatives and similar repositories for Swiss_E-Voting_Publications:
Users that are interested in Swiss_E-Voting_Publications are comparing it to the libraries listed below
- ☆52Updated 5 years ago
- Red Team Resources☆59Updated 6 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- New TLS Padding Oracles☆125Updated last year
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- 34C3 Junior CTF pwnables☆117Updated 6 years ago
- TLS - what can go wrong?☆100Updated 6 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 5 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- ☆25Updated 7 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 6 years ago
- An ARP Poisoning Defender script☆43Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆55Updated 3 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- dev level ;-)☆10Updated 6 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- TLS Redirection☆120Updated 7 years ago
- Puny Domain Name Check☆37Updated 5 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Updated 5 months ago
- ☆97Updated 3 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- A docker example for privilege escalation☆25Updated 7 years ago
- Git Web Hook Tunnel for C2☆28Updated last year
- Lightweight and extensible horizontal vulnerability scanner☆11Updated 2 years ago
- Jaqen - Simple DNS rebinding☆73Updated 7 years ago