tweksteen / burstLinks
HTTP framework
☆48Updated 8 years ago
Alternatives and similar repositories for burst
Users that are interested in burst are comparing it to the libraries listed below
Sorting:
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Fuzzing things with afl and python-afl☆59Updated 9 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 9 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26Updated 14 years ago
- setroubleshootd xSports☆93Updated 8 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated 6 years ago
- 🗃️ This repository has been integrated into mitmproxy/mitmproxy.☆349Updated 9 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆73Updated 9 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Response☆56Updated 9 years ago
- Detect some forms of linux kernel tampering☆12Updated 10 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- Chrome address spoofing vulnerability proof-of-concept for HTTPS. (Original by David Leo.)☆208Updated 10 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Tools to help detect Hacking Team malware☆79Updated 10 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- A small SSH server written in Go that checks for weak SSH keys☆13Updated 9 years ago
- My little fuzzing framework inspired by grinder☆99Updated 8 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Tool used to continuously monitor a Github org for mistaken public commits☆166Updated 9 years ago