☆55Feb 11, 2019Updated 7 years ago
Alternatives and similar repositories for Practical-SSL-TLS-Attacks
Users that are interested in Practical-SSL-TLS-Attacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AV-evading Pythonic Reverse Shell with Dynamic Adaption Capabilities☆72Sep 9, 2021Updated 4 years ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- A comprehensive list of guides, handbooks, scripts, and fully featured apps required to initiate Hyper-Jacking Attacks (Theft of a Virtru…☆15Apr 1, 2018Updated 8 years ago
- Simple example of separate rotation of 3d objects with using Kivy☆18Jun 24, 2013Updated 12 years ago
- JSON CSRF PoC☆14Aug 1, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Dll injection for executable file☆17Jul 22, 2016Updated 9 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 12 years ago
- NTP command & control☆17Oct 14, 2020Updated 5 years ago
- A Platform for Testing Secure Coding/Config☆19Nov 13, 2018Updated 7 years ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆35Feb 2, 2026Updated 3 months ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- malloc for memory-mapped files☆14Jun 25, 2020Updated 5 years ago
- WordPress Backup Guard Authenticated Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Code and Word2Vec embeddings of LOINC codes for KDD 2019 DSHealth paper "Evaluation of Embeddings of Laboratory Test Codes for Patients a…☆11Jun 13, 2024Updated last year
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆43Sep 3, 2020Updated 5 years ago
- This is the android client/trojan, it's undetectable, can turn the target phone to a HTTP proxy and runs in the background permanently wi…☆13Jan 10, 2021Updated 5 years ago
- A collection of notes: things I'd like to remember while reading technical articles, technical questions I couldn't answer, and so on.☆12Jan 3, 2023Updated 3 years ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 2 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Generate Valid Phone Numbers With The NPA-NXX Database☆12May 13, 2023Updated 2 years ago
- Decrypts blowfish (w. static key) encrypted hMail database password.☆15Feb 21, 2018Updated 8 years ago
- Simple tool to perform HTML Smuggling.☆67Aug 17, 2021Updated 4 years ago
- BurpSuite extension that helps find user input in a GWT body.☆12May 29, 2020Updated 5 years ago
- [Confluence] CVE-2023-22527 realworld poc☆19Jan 23, 2024Updated 2 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- USENIX 2023 Artifacts☆11Nov 25, 2022Updated 3 years ago
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆79Sep 29, 2024Updated last year
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Hello World app for Flipper Zero☆15May 16, 2024Updated last year
- ☆11Oct 17, 2024Updated last year
- Sentio - a Small Voting App☆11May 28, 2017Updated 8 years ago
- ☆43Dec 2, 2021Updated 4 years ago
- CVE-2020-7384☆10Feb 7, 2021Updated 5 years ago
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- MacOS dotfiles with an easy installation script☆21Jun 16, 2019Updated 6 years ago