Compression Oracle Attack on OpenVPN
☆13Sep 24, 2023Updated 2 years ago
Alternatives and similar repositories for voracle
Users that are interested in voracle are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Simple decrypter for strings used in SamSam Ransomware samples.☆18Feb 21, 2020Updated 6 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- ☆37Jun 7, 2019Updated 6 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Dec 9, 2020Updated 5 years ago
- Web-Service for plato - JavaScript source code visualization, static analysis, and complexity tool☆19Dec 2, 2013Updated 12 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆16Jan 15, 2021Updated 5 years ago
- An automatic Bot that generates and checks Fortnite gift codes.☆10Jan 9, 2021Updated 5 years ago
- This repository is created for personal use and added tools from my blog post.☆14Aug 27, 2023Updated 2 years ago
- Example container image for running on Cloudflare's container runtime☆10Jan 22, 2025Updated last year
- Hourly Checked and Updated Spamhaus IP Addresses lists☆47Feb 27, 2024Updated 2 years ago
- An nginx module to prevent generic compression oracles☆10Sep 25, 2024Updated last year
- Memcache hacking tool.☆47Apr 20, 2017Updated 8 years ago
- A node utility to scan a domain with various techniques.☆12Sep 10, 2020Updated 5 years ago
- A httpbin reimplementation in rust☆10Dec 29, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- A Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.☆25Dec 27, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Simple daemon to create a wifi hotspot on Linux☆14May 17, 2020Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Nov 1, 2019Updated 6 years ago
- An http2 stack living on top of scapy☆11Oct 24, 2018Updated 7 years ago
- Script to show progress for an Index or Vacuum of a Postgresql Table☆12Mar 14, 2019Updated 7 years ago
- IP Puller, IP Sniffer and IP grabber for PS4 and Xbox☆13Jan 7, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Rust `Vec` that can store unsized values☆22Sep 13, 2025Updated 6 months ago
- Pool Overflow in OpenVpn NDIS TAP Driver☆17Nov 3, 2015Updated 10 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆10Mar 22, 2018Updated 8 years ago
- ☆16Jun 1, 2018Updated 7 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- Hardening Tool for *nixes☆50Apr 22, 2017Updated 8 years ago
- A simple parser for Git diffs☆23Apr 23, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Candice, a dead simple language and multi-platform.☆17Jul 27, 2024Updated last year
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- Created by David Maloney via the GitHub Connector☆12Jul 10, 2025Updated 8 months ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago