tbiehn / CURRYFINGERLinks
CURRYFINGER - SNI & Host header spoofing utility.
☆109Updated 5 years ago
Alternatives and similar repositories for CURRYFINGER
Users that are interested in CURRYFINGER are comparing it to the libraries listed below
Sorting:
- A collection of scripts that help handling X.509 certificate and TLS issues☆128Updated 2 weeks ago
- Pown Proxy is a versatile web application security testing proxy with cool TUI features.☆60Updated 6 years ago
- A guide and tool for cracking ssh known_hosts files with hashcat☆335Updated last year
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆106Updated 10 months ago
- A DNS connectback shell executed by strings in payloads.txt☆104Updated last year
- One-click utility to test race conditions☆165Updated 7 years ago
- An open source tool to capture screen and network instantly helping security engineers reproduce bugs☆83Updated 4 years ago
- Web on top of any protocol☆114Updated 5 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆77Updated 5 years ago
- Harden your Chrome browser via enterprise policy.☆290Updated 2 years ago
- A Tool for DNS Delegation Trust Graphing☆402Updated 2 years ago
- Anteater - CI/CD Gate Check Framework☆177Updated 2 years ago
- A medium interaction printer honeypot 🍯☆202Updated 2 years ago
- The source code of https://requestbin.net☆175Updated 2 years ago
- New TLS Padding Oracles☆125Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆111Updated 5 years ago
- A Go client for crobat☆24Updated 5 years ago
- A search engine for content shared publicly via cloud storage services☆101Updated last year
- Demonstrating that disabling ICC in docker does not block raw packets between containers.☆65Updated 7 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- Discover SPOF in DNS dependency graphs☆66Updated 7 years ago
- Repository demonstrating the Capital One breach on your AWS account☆242Updated 4 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆119Updated 2 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆142Updated 7 years ago
- hardCIDR is a Linux Bash script, but also functions under macOS. Your mileage may vary on other distros. The script with no specified opt…☆370Updated 3 years ago
- ☆25Updated 7 years ago
- Golang-based subdomain miner leveraging certificate transparency logs☆76Updated last year
- The Swiss Army knife for backend engineers.☆97Updated 4 years ago
- CLI tool for PKCS7 padding oracle attacks☆138Updated 4 years ago