tweksteen / burstLinks
HTTP framework
☆48Updated 7 years ago
Alternatives and similar repositories for burst
Users that are interested in burst are comparing it to the libraries listed below
Sorting:
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- 🗃️ This repository has been integrated into mitmproxy/mitmproxy.☆349Updated 9 years ago
- setroubleshootd xSports☆92Updated 8 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- Badass encryption for Twitter☆64Updated 9 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A Python port of the triplesec library.☆82Updated last year
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Grab files matching a search specification from Github☆110Updated 4 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Chair and the Key☆64Updated 9 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 9 years ago
- A simple web based tool for working with assembly / disassembly☆89Updated 6 months ago
- ☆30Updated 10 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26Updated 14 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆31Updated 9 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- Detects code differentials between executables in disk and the corresponding processes/modules in memory☆115Updated 4 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated 6 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 9 years ago
- Tools and ideas to help with PGP keys and fingerprint verification☆58Updated last year