veorq / blueflower
a grep -r for secrets
☆176Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for blueflower
- Testing/collecting some container breakouts☆93Updated 5 years ago
- A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificat…☆94Updated 9 years ago
- Time Trial - A tool for performing feasibility analyses of timing attacks☆83Updated 10 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆92Updated 6 years ago
- ☆111Updated 7 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 7 years ago
- Store Burp data and collaborate via git☆54Updated 5 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆104Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆158Updated 8 years ago
- HTTP Header Analysis Vulnerability Tool☆112Updated 3 years ago
- A framework for BREACH and other compression-based crypto attacks☆227Updated 4 years ago
- free crypto audit☆31Updated 7 years ago
- Common Findings Database☆100Updated 5 years ago
- proxy poc implementation of STARTTLS stripping attacks☆166Updated 2 years ago
- burpbuddy exposes Burp Suites's extender API over the network through various mediums, with the goal of enabling development in any langu…☆156Updated 5 years ago
- Does your library check TLS certificates properly?☆78Updated last year
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- 8ball☆18Updated last year
- Use computer vision to determine if an IDN can be interpreted as something it's not☆63Updated 7 years ago
- Data Exfiltration and Command Execution via AAAA Records☆67Updated 8 years ago
- ☆198Updated 8 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆97Updated 6 years ago
- Exfiltrate files via DNS☆96Updated 11 years ago
- A regex based source code scanner.☆128Updated 7 years ago
- Self contained cross platform DNS recon tool☆187Updated 7 years ago
- A Burp Plugin for Detecting Weaknesses in Content Security Policies☆163Updated last year