tweksteen / burstLinks
HTTP framework
☆48Updated 7 years ago
Alternatives and similar repositories for burst
Users that are interested in burst are comparing it to the libraries listed below
Sorting:
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- Statically linked Library detector☆70Updated 10 years ago
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- a tiny, custom launcher that handles namespacing, control groups, chroot'ing, and more☆55Updated 2 years ago
- Badass encryption for Twitter☆64Updated 9 years ago
- Chair and the Key☆64Updated 9 years ago
- Tor Browser and Tails version fingerprint PoC☆136Updated 6 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- Live at http://extractdata.club☆166Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- netcat that takes unfair advantage of traffic shaping systems that don't initially ratelimit☆2Updated 4 years ago
- Pbd is a Python module to disassemble serialized protocol buffers descriptors (https://developers.google.com/protocol-buffers/).☆86Updated 4 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- A python "tool" for "interacting" with the terminals of "friends" and "colleagues".☆155Updated 10 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- A magic pipe in the sky for the command line☆306Updated 12 years ago
- setroubleshootd xSports☆92Updated 8 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 8 years ago
- ☆30Updated 10 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago