xPaw / HTTPsys
š„ A checker site for MS15-034 / CVE-2015-1635
ā38Updated 9 years ago
Alternatives and similar repositories for HTTPsys:
Users that are interested in HTTPsys are comparing it to the libraries listed below
- A command line Hash Identifying tool.ā101Updated 6 years ago
- A tool to extract database data from a blind SQL injection vulnerability.ā31Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.ā33Updated 8 years ago
- A hacked together PHP shell designed to be stealthy and portableā52Updated 11 years ago
- An experimental implementation of a bot client which interprets commands through Twitter, thus requiring no hosting of servers from the cā¦ā44Updated 9 years ago
- ā74Updated 11 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerabilityā14Updated 9 years ago
- Some kernel exploit i wroteā77Updated 10 years ago
- A PoC for exploiting Guzzle's HTTP_PROXY untrusted readā54Updated 8 years ago
- A multi service threaded MD5 crackerā66Updated 8 years ago
- Proof of Concept code for CVE-2016-5696ā101Updated 8 years ago
- A tool for discovering subdomains via third party services and wordlists.ā75Updated 8 years ago
- SSH Based Remote Administration Toolā104Updated 9 years ago
- PoC for getting remote HTTP Server date using gzip compressed HTTP Responseā56Updated 9 years ago
- CVE-2015-3152 PoCā43Updated 9 years ago
- Reverse Engineering and Exploit Development stuffā31Updated 7 years ago
- Demo of how to create binaries with a colliding MD5ā32Updated 8 years ago
- Transparent proxy that decrypts SSL traffic and prints out IRC messages.ā77Updated 11 years ago
- Advanced HTTP fingerprinting PoCā44Updated 8 years ago
- A script that inspects multi-byte character sets looking for characters with specific user-defined propertiesā26Updated 8 years ago
- ā56Updated 7 years ago
- LNHG - Mass Web Fingerprinterā61Updated 9 years ago
- Scripts that aren't PowerShellā47Updated 5 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.ā31Updated 8 years ago
- Collection of tools for web recon and enumeration.ā56Updated 9 years ago
- A better SSL cipher checker using gnutlsā28Updated 7 years ago
- A regex based source code scanner.ā129Updated 7 years ago
- Connection-less Powershell Persistent and Resilient Backdoorā231Updated 9 years ago
- Understanding weaknesses within Internet Explorer's Isolated Heap and MemoryProtectionā90Updated 9 years ago
- Quickly add disruptive unicode, dangerous strings, and more to your clipboard.ā25Updated 9 years ago