Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.
☆37Jun 11, 2016Updated 9 years ago
Alternatives and similar repositories for LAMMA-beta
Users that are interested in LAMMA-beta are comparing it to the libraries listed below
Sorting:
- ☆25Dec 13, 2016Updated 9 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- ☆11Aug 2, 2016Updated 9 years ago
- Programmatically access a TLS certificate chain in C++ and C#☆12Oct 27, 2018Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- Remote Desktop Protocol in Twisted Python☆26Apr 13, 2018Updated 7 years ago
- Python module suitable to use multiple OpenVPN connections☆12Jan 23, 2020Updated 6 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13May 8, 2018Updated 7 years ago
- Python script for privilege escalation for Python☆11Jun 5, 2020Updated 5 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Alpha version code of Recon UI☆15Feb 26, 2018Updated 8 years ago
- Encrypt files in self-decrypting html files using libsodium☆19Dec 11, 2020Updated 5 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Sep 2, 2013Updated 12 years ago
- ☆20Jun 13, 2019Updated 6 years ago
- Python Package for burprestapi☆17Dec 27, 2019Updated 6 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Nov 4, 2025Updated 4 months ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆23Sep 15, 2021Updated 4 years ago
- cgo wrappers around post-quantum cryptography primitives☆23Dec 3, 2018Updated 7 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- All tools you needed during penetration testing.☆18Mar 26, 2017Updated 8 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- like ChaCha, but 64-bit instead of 32-bit thanks to BLAKE2b's permutation☆16Apr 8, 2017Updated 8 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Aug 13, 2019Updated 6 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- It records your screenshots and code, then lets you upload to ASHIRT☆57Feb 11, 2026Updated 3 weeks ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- Slides of 44Con 2018☆22Oct 11, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Tool for introspection of SSL\TLS sessions☆146Updated this week
- Java Object Deserialization on Android☆86Apr 11, 2019Updated 6 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 7 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago