tweksteen / burstLinks
HTTP framework
☆48Updated 8 years ago
Alternatives and similar repositories for burst
Users that are interested in burst are comparing it to the libraries listed below
Sorting:
- A collection of toy programs for teaching buffer overflow vulnerabilities.☆55Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Fuzzing things with afl and python-afl☆59Updated 9 years ago
- A public database for software and firmware hashes☆214Updated 9 years ago
- Dear user: This is a git mirror of our Mercurial repository in https://bokken.inguma.eu that you can use if you prefer to use pull reque…☆120Updated 8 years ago
- Statically linked Library detector☆70Updated 10 years ago
- This tool seeks asynchronously TrueCrypt key file using combinations of provided key files with provided password.☆48Updated 7 years ago
- Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.☆275Updated 10 years ago
- Tool used to continuously monitor a Github org for mistaken public commits☆166Updated 9 years ago
- My little fuzzing framework inspired by grinder☆100Updated 8 years ago
- 🗃️ This repository has been integrated into mitmproxy/mitmproxy.☆349Updated 9 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Tor Browser and Tails version fingerprint PoC☆137Updated 7 years ago
- setroubleshootd xSports☆93Updated 8 years ago
- Dynamic Visual Debugging / Reverse Engineering Toolsuite☆251Updated 6 years ago
- A database of published security advisories reported by the Programa STIC Team at Fundación Sadosky☆87Updated 8 years ago
- Archive of software and other data involved in the Superfish / Komodia incident☆61Updated 6 years ago
- proof of concept to backdoor files from owncloud encryption module☆17Updated 9 years ago
- Android wireless karma attack detector☆67Updated 10 years ago
- Library and tools to interact with and analyze Tor HSDirs.☆72Updated 9 years ago
- A magic pipe in the sky for the command line☆306Updated 12 years ago
- A collection of shellcodes for BSD and Linux for exploit development☆26Updated 14 years ago
- Various cryptographic backdoors and tools to detect them☆21Updated 10 years ago
- Creates fuzzing inputs for command line programs using help options and man pages.☆29Updated 10 years ago
- Index of websites publishing bugs along the lines of heartbleed.com☆40Updated 7 years ago
- USB armory: open source flash-drive-sized computer☆11Updated 9 years ago
- The "Intel x86 considered harmful" paper☆199Updated 9 years ago
- Wolves Among the Sheep☆147Updated 2 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the c…☆43Updated 10 years ago
- Probably one of the smallest SSL MITM proxies you can make☆183Updated 10 years ago