setuid0-sec / Swiss_E-Voting_PublicationsLinks
Our publications of the Swiss E-Voting Public Intrusion Test (PIT)
☆47Updated 6 years ago
Alternatives and similar repositories for Swiss_E-Voting_Publications
Users that are interested in Swiss_E-Voting_Publications are comparing it to the libraries listed below
Sorting:
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- ☆52Updated 5 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- Repository for Insomni'hack finals 2015☆22Updated 10 years ago
- ☆25Updated 7 years ago
- Scan for and exploit Consul agents☆40Updated 5 years ago
- Scapy hands-on at #GreHack17☆16Updated 7 years ago
- Artifacts for the USENIX publication.☆58Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Updated 4 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- Conference talk slides and code☆11Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- ☆38Updated 4 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- Mimipenguin密码抓取神器☆26Updated 7 years ago
- An extension for BurpSuite that highlights SSO messages in Burp's proxy window..☆118Updated 4 years ago
- Web of trust grapher☆38Updated 2 weeks ago
- Small CTF challenges running on Docker☆159Updated 6 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- Collection of XSS Payloads from various sources☆29Updated 8 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- yet another dirbuster☆19Updated 4 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆49Updated 3 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 10 months ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago