setuid0-sec / Swiss_E-Voting_PublicationsLinks
Our publications of the Swiss E-Voting Public Intrusion Test (PIT)
☆47Updated 6 years ago
Alternatives and similar repositories for Swiss_E-Voting_Publications
Users that are interested in Swiss_E-Voting_Publications are comparing it to the libraries listed below
Sorting:
- Red Team Resources☆60Updated 6 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- TLS Redirection☆120Updated 8 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- ☆53Updated 6 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- A docker example for privilege escalation☆25Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- ☆90Updated 8 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆94Updated 4 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- proxy poc implementation of STARTTLS stripping attacks☆171Updated 3 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 6 years ago
- Reverse shell container for k8s deployments☆49Updated 5 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- A small, fluid, low-interaction honeypot☆19Updated 6 years ago
- ☆25Updated 8 years ago
- Repository containing many useful scripts☆75Updated 3 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- I wrote a book about privacy and OPSEC, so here it is.☆67Updated 6 years ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆89Updated 7 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- An ARP Poisoning Defender script☆43Updated 7 years ago