swarley7 / padoracle
A framework for exploiting padding oracles in network-based applications
☆26Updated last year
Alternatives and similar repositories for padoracle:
Users that are interested in padoracle are comparing it to the libraries listed below
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- ☆19Updated 4 years ago
- Encode binary as English text over HTTP(s)☆30Updated last year
- ☆33Updated 4 years ago
- ☆17Updated 3 years ago
- A python-based padding oracle tool☆20Updated 5 months ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated 10 months ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆19Updated 4 years ago
- ☆11Updated 2 years ago
- Kubernetes Scanner☆40Updated 2 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- Protect your servers with a secret header☆28Updated 4 years ago
- ☆31Updated 3 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 7 years ago
- Remote Java classpath enumeration via deserialization☆22Updated last year
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- F# Implementation to spawn shellcode☆47Updated 6 years ago
- Provides access to libhashcat☆30Updated 9 months ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 4 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆24Updated 2 years ago
- various slides and presentations I've worked on☆18Updated 10 months ago
- Zoom Persistence Aggressor and Handler☆54Updated 3 years ago