The TLS-Scanner Module from TLS-Attacker
☆282Feb 12, 2026Updated last month
Alternatives and similar repositories for TLS-Scanner
Users that are interested in TLS-Scanner are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a so…☆864Feb 12, 2026Updated last month
- New TLS Padding Oracles☆125May 14, 2023Updated 2 years ago
- Framework for creating fuzzers and negative tests for TLS 1.3 implementations☆13Mar 21, 2024Updated 2 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- sslxray is an SSL/TLS scanning tool designed to detect a wide range of issues☆28Aug 9, 2018Updated 7 years ago
- Case for CVE-2022-30778☆23Aug 23, 2022Updated 3 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- SSL and TLS protocol test suite and fuzzer☆617Mar 17, 2026Updated last week
- Finding all things on-prem Microsoft for password spraying and enumeration.☆257May 17, 2022Updated 3 years ago
- 破解CS4.0☆16Feb 14, 2022Updated 4 years ago
- TLS CBC Padding Oracle Checker☆52Feb 25, 2022Updated 4 years ago
- BlueHound - pinpoint the security issues that actually matter☆761Jul 12, 2023Updated 2 years ago
- E4's C2 server☆21Oct 12, 2020Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- async parser for JET☆25Nov 14, 2025Updated 4 months ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- Python library with CLI allowing to remotely dump domain user credentials via an ADCS without dumping the LSASS process memory☆399Aug 15, 2025Updated 7 months ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- ☆12Sep 23, 2021Updated 4 years ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Roast in the Middle☆294Sep 19, 2025Updated 6 months ago
- This are different types of download cradles which should be an inspiration to play and create new download cradles to bypass AV/EPP/EDR …☆256Jul 7, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Just a bunch of code snippets to identify and remediate common Active Directory Certificate Services issues.☆36Feb 13, 2024Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆103May 4, 2019Updated 6 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆27Mar 9, 2022Updated 4 years ago
- ☆1,288Jul 13, 2023Updated 2 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Script generated finite field arithmetic for elliptic curve cryptography☆24Mar 4, 2026Updated 2 weeks ago
- WMEye is a post exploitation tool that uses WMI Event Filter and MSBuild Execution for lateral movement☆369Dec 24, 2021Updated 4 years ago
- Application and Service Fingerprinting☆134Dec 8, 2022Updated 3 years ago
- TLS-Anvil, a fully automated TLS testsuite for client and servers.☆103Feb 9, 2026Updated last month
- Some stuff for PHD2021☆14May 21, 2025Updated 10 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,273Dec 9, 2025Updated 3 months ago
- ☆22Mar 4, 2025Updated last year
- Fast and configurable TLS grabber focused on TLS based data collection.☆1,075Updated this week