setuid0-sec / Swiss_E-Voting_PublicationsLinks
Our publications of the Swiss E-Voting Public Intrusion Test (PIT)
☆47Updated 6 years ago
Alternatives and similar repositories for Swiss_E-Voting_Publications
Users that are interested in Swiss_E-Voting_Publications are comparing it to the libraries listed below
Sorting:
- Red Team Resources☆60Updated 6 years ago
- ☆52Updated 6 years ago
- TLS Redirection☆120Updated 7 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- Hunt Open MongoDB instances☆79Updated 6 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- The knife of the Admin & Security auditor☆42Updated 5 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)☆48Updated 7 years ago
- An ARP Poisoning Defender script☆43Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- Reverse shell container for k8s deployments☆49Updated 5 years ago
- A small, fluid, low-interaction honeypot☆19Updated 6 years ago
- All related files and slides for past talks☆44Updated 2 years ago
- dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software☆55Updated 5 years ago
- DNS server limitation mapper☆26Updated 7 years ago
- Drupal Honeypot☆57Updated 6 years ago
- ☆38Updated 5 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Updated 7 years ago
- Jaqen - Simple DNS rebinding☆75Updated 7 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- WhiteBox CMS analysis☆68Updated 2 years ago
- I read 20 years of mostly-fail at cyber norms at the UN, and now you can too!☆21Updated 7 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- A PoC on passing data through UNIX file privilege bits (RWX Triplets)☆27Updated 8 years ago
- Repository for Insomni'hack finals 2015☆22Updated 10 years ago