tweksteen / burst
HTTP framework
☆48Updated 7 years ago
Alternatives and similar repositories for burst:
Users that are interested in burst are comparing it to the libraries listed below
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- Fuzzing things with afl and python-afl☆59Updated 8 years ago
- My little fuzzing framework inspired by grinder☆99Updated 7 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 9 years ago
- A public database for software and firmware hashes☆215Updated 8 years ago
- Statically linked Library detector☆70Updated 10 years ago
- Educational SSH client☆123Updated 8 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 7 years ago
- ☆30Updated 9 years ago
- Badass encryption for Twitter☆66Updated 8 years ago
- Grab files matching a search specification from Github☆110Updated 4 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 6 years ago
- Chair and the Key☆65Updated 9 years ago
- 🔒 Simple perfect xor encryption cipher 🔒☆62Updated 8 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 6 years ago
- The "Intel x86 considered harmful" paper☆195Updated 9 years ago
- Small and cheap standalone USB sanitizer☆42Updated 3 years ago
- proof of concept to backdoor files from owncloud encryption module☆18Updated 8 years ago
- 🗃️ This repository has been integrated into mitmproxy/mitmproxy.☆348Updated 8 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 7 years ago
- Android wireless karma attack detector☆66Updated 9 years ago
- A simple web based tool for working with assembly / disassembly☆88Updated 2 months ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 9 years ago
- A magic pipe in the sky for the command line☆307Updated 12 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Some code to bruteforce OpenBSD softraid encrypted drives - NOT A READY-TO-USE TOOL☆58Updated 8 years ago
- Recovery of Plaintext iMessage Data Without Breaking Crypto☆106Updated 8 years ago
- Proof-of-concept exploit code for CVE-2016-5696☆73Updated 8 years ago
- ☆116Updated 9 years ago