twosixlabs / acsploitLinks
A tool for generating worst-case inputs to commonly used algorithms
☆121Updated 2 years ago
Alternatives and similar repositories for acsploit
Users that are interested in acsploit are comparing it to the libraries listed below
Sorting:
- ☆252Updated 4 years ago
- collection of verified Linux kernel exploits☆189Updated 4 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 3 years ago
- OpenAPI 2.0 (Swagger) fuzzer written in python. Basically TnT for your API.☆111Updated 2 years ago
- ☆272Updated 2 years ago
- ☆232Updated 6 years ago
- A Node.js vulnerability finding tool.☆96Updated 2 months ago
- The source code v2.0 of https://requestbin.net (now is v3.0)☆176Updated 3 weeks ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆202Updated 6 years ago
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆50Updated 7 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- A web UI and server for task based competitions employing Etherpad Lite.☆114Updated 6 years ago
- Checksec tool in Python, Rich output. Based on LIEF☆345Updated 3 weeks ago
- PoC for leaking text nodes via CSS injection☆35Updated 7 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆173Updated 8 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- ☆23Updated 5 years ago
- 35C3 Junior CTF pwnables☆148Updated 6 years ago
- TLS Redirection☆120Updated 7 years ago
- research☆151Updated last year
- A Python implementation that facilitates finding timeless timing attack vulnerabilities.☆127Updated 5 months ago
- ☆162Updated 3 weeks ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆210Updated 2 years ago
- An all-in-one tool including many common attacks against RSA problems in CTF.☆103Updated 7 years ago
- A fuzzing framework for network servers☆118Updated 7 years ago
- A cross-platform browser fuzzing framework☆312Updated 2 weeks ago
- Finding potential software vulnerabilities from git commit messages☆417Updated 2 years ago
- BSidesSF CTF 2019 release☆71Updated 2 years ago
- The Guppy Proxy (GUI Pappy)☆143Updated 6 years ago