skepticfx / voracle
Compression Oracle Attack on OpenVPN
☆12Updated last year
Alternatives and similar repositories for voracle:
Users that are interested in voracle are comparing it to the libraries listed below
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Jaqen - Simple DNS rebinding☆73Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Linux 4.9 Loadable Kernel Module to hide processes from system utilities☆67Updated 6 years ago
- ☆11Updated 8 years ago
- Datajack Proxy allows you to intercept TLS traffic in native x86 applications across platforms☆102Updated 5 years ago
- TLS CBC Padding Oracle Checker☆52Updated 3 years ago
- This is a scapy-based Python performance art piece. It creates a little magic on the internet by pretending to portscan from random netwo…☆38Updated 6 years ago
- ☆44Updated 2 months ago
- Whitelisting LD_PRELOAD libraries using LD_AUDIT☆62Updated 3 years ago
- Use Markov Chains to obfuscate data as other data☆52Updated 8 years ago
- ☆52Updated 5 years ago
- ☆25Updated 7 years ago
- This is a kernel module invoked reverse shell proof of concept.☆72Updated 5 years ago
- An Interactive Pcap Editor (based on Scapy)☆23Updated 4 years ago
- Some simple go tools to perform a Man-in-the-middle (MITM) attack on your IMAP server in case you forgot your password.☆64Updated 6 years ago
- Simple script you can use to convert and obscure any IP address of any host.☆111Updated 3 years ago
- A shellcode testing harness.☆69Updated 9 months ago
- Rogue AP killer☆89Updated 7 years ago
- Wi-Fi Covert Channel Chat demo application☆72Updated 7 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆38Updated 5 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- Scapy hands-on at #GreHack17☆16Updated 7 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- THC "R U There" network discovery tool☆27Updated 4 years ago
- Created by David Maloney via the GitHub Connector☆12Updated 2 months ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- A tiny set of helper scripts for ipinfo☆17Updated 4 years ago
- An example rootkit that gives a userland process root permissions☆77Updated 5 years ago
- evil mass storage *AT90USBKEY2 (poc-malware-tool for offline system)☆31Updated last year