swarley7 / padoracle
A framework for exploiting padding oracles in network-based applications
☆25Updated last year
Related projects ⓘ
Alternatives and complementary repositories for padoracle
- Exfiltration based on custom X509 certificates☆26Updated 8 months ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆18Updated 4 years ago
- PoC for CVE-2021-4034 dubbed pwnkit☆33Updated 2 years ago
- ☆19Updated 4 years ago
- reboot of https://github.com/Genetic-Malware/Ebowla in order to simplify / modernize the codebase and provide ongoing support☆21Updated 3 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆17Updated 5 years ago
- ☆31Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- ☆11Updated last year
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- ☆20Updated 4 years ago
- In 'n Out - See what goes in and comes out of PEs☆32Updated 2 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 7 years ago
- pypykatz plugin for volatility3 framework☆31Updated 7 months ago
- My python3 implementation of a Forward Shell☆35Updated 5 years ago
- A python-based padding oracle tool☆20Updated 2 months ago
- various slides and presentations I've worked on☆18Updated 8 months ago
- Zoom Persistence Aggressor and Handler☆53Updated 3 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A basic AIX enumeration guide for penetration testers/red teamers☆31Updated 7 years ago
- This is a 64 bit VBA implementation of Christophe Tafani-Dereeper's original VBA code described in his blog @ https://blog.christophetd.f…☆19Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- An enumeration and exploitation toolkit using RFC calls to SAP☆36Updated 4 years ago
- Screenshot Shenanigans☆25Updated 6 years ago
- Protect your servers with a secret header☆28Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆33Updated 3 years ago
- Alphanumeric Encoder☆25Updated 6 years ago