smxlabs / LAMMA-betaLinks
Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.
☆37Updated 9 years ago
Alternatives and similar repositories for LAMMA-beta
Users that are interested in LAMMA-beta are comparing it to the libraries listed below
Sorting:
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated last year
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- A shellcode testing harness.☆69Updated last year
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- A python implementation of a grep friendly ftrace wrapper☆80Updated 6 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago
- Puny Domain Name Check☆37Updated 5 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- ☆50Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- Automated enumeration☆30Updated 4 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- ☆89Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆50Updated 7 years ago
- Exfiltration Framework - Exfiltration modeling tool written in Python. Naisho attempts to avoid detection from DLP, IPS/IDS egress filter…☆39Updated 10 years ago
- A Network Inspection Tool☆81Updated 7 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- ☆12Updated 8 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- sniff/log database traffic or actively execute arbitrary queries via TCP injection☆42Updated 9 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- A BurpSuite extension for lair☆28Updated 7 years ago