swarley7 / padoracleView external linksLinks
A framework for exploiting padding oracles in network-based applications
☆26Feb 25, 2023Updated 2 years ago
Alternatives and similar repositories for padoracle
Users that are interested in padoracle are comparing it to the libraries listed below
Sorting:
- ☆33Aug 14, 2020Updated 5 years ago
- Implements io.ReaderAt over raw memory.☆13Jun 26, 2020Updated 5 years ago
- In 'n Out - See what goes in and comes out of PEs☆35May 12, 2022Updated 3 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Nov 15, 2018Updated 7 years ago
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- A collection of utilities to simplify the creation of Burp Suite plugins☆22Dec 14, 2023Updated 2 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Feb 16, 2017Updated 9 years ago
- Really stupid re-implementation of invoke-wmiexec☆217Feb 25, 2023Updated 2 years ago
- Shikata ga nai (仕方がない) encoder ported into go with several improvements☆31Jan 28, 2026Updated 2 weeks ago
- ☆50Jun 28, 2022Updated 3 years ago
- ViewState Payload Generator☆27Aug 17, 2018Updated 7 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Aug 22, 2025Updated 5 months ago
- Embedded, small and composable Zero-Trust Teamserver made for collaborative Go programs or CLI applications.☆13Jul 10, 2025Updated 7 months ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Jan 29, 2022Updated 4 years ago
- A logging ASKPASS binary☆29May 29, 2020Updated 5 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Jun 6, 2019Updated 6 years ago
- Takes unallocated memory and fills it with junk to mess with forensics tools.☆13Jan 4, 2024Updated 2 years ago
- This repository contains hit lists to use for web application content discovery.☆11May 31, 2017Updated 8 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Feb 25, 2023Updated 2 years ago
- An intuitive and encrypted in-memory filesystem (VFS)☆101Nov 20, 2025Updated 2 months ago
- Encryption Abstraction Layer and Utilities for ratnet☆18May 3, 2024Updated last year
- A tool to generate macOS initial access vectors using Prelude Operator payloads☆18May 25, 2022Updated 3 years ago
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- Keyhack - Golang API token/webhook validator☆16Mar 20, 2025Updated 10 months ago
- pypykatz plugin for volatility3 framework☆46May 30, 2025Updated 8 months ago
- Go implementation of the Heaven's Gate technique☆102Feb 11, 2021Updated 5 years ago
- View screenshots as a slideshow over http☆15Mar 13, 2020Updated 5 years ago
- Execute MachO binaries in memory using CGo☆79May 24, 2021Updated 4 years ago
- https://regexcrossword.com/ solver using Z3py☆20Jan 14, 2022Updated 4 years ago
- A Go scraper that validates security.txt files and outputs them in the disclose.io JSON format.☆23May 18, 2025Updated 8 months ago
- Fork of pkg/debug that adds some additional functionality.☆128Mar 21, 2024Updated last year
- A PoC package for hosting the CLR and executing .NET from Go☆78Jul 9, 2024Updated last year
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 4 years ago
- Standalone Go implementation of Metasploit's "db_nmap" and "db_import" commands.☆19Nov 6, 2024Updated last year
- Dump ntds.dit really fast☆410Oct 1, 2021Updated 4 years ago
- ☆50Dec 15, 2025Updated 2 months ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- Cross-platform proxy selection with optional native authentication negotiation☆53Feb 25, 2023Updated 2 years ago
- Hostname filtering for arbitrary network protocols☆23Feb 9, 2026Updated last week