dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+37.86%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+300.97%)
TIGERPython toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (+0%)
SingularityA DNS rebinding attack framework.
Stars: ✭ 621 (+502.91%)
Pentest GuidePenetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+1177.67%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-15.53%)
Tlstunnel LwtTLS tunnel -- an alternative to stud / stunnel
Stars: ✭ 79 (-23.3%)
AmonetA bootrom exploit for MediaTek devices
Stars: ✭ 96 (-6.8%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+10046.6%)
Docker OpenldapDocker OpenLDAP Container w/TLS & Replication Support S6 Overlay, and Zabbix Monitoring based on Alpine
Stars: ✭ 74 (-28.16%)
Voyager🚀 Secure HAProxy Ingress Controller for Kubernetes
Stars: ✭ 1,276 (+1138.83%)
DeautherdroidAdditional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (-9.71%)
MrspickyMrsPicky - An IDAPython decompiler script that helps auditing calls to the memcpy() and memmove() functions.
Stars: ✭ 86 (-16.5%)
SsrfmapAutomatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (+1204.85%)
AptAPT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (-19.42%)
Cve 2018 20555Social Network Tabs Wordpress Plugin Vulnerability - CVE-2018-20555
Stars: ✭ 78 (-24.27%)
Koa SslifyEnforce HTTPS in node.js koa apps
Stars: ✭ 100 (-2.91%)
GhostunnelA simple SSL/TLS proxy with mutual authentication for securing non-TLS services
Stars: ✭ 1,296 (+1158.25%)
UnjailmeA sandbox escape based on the proof-of-concept (CVE-2018-4087) by Rani Idan (Zimperium)
Stars: ✭ 73 (-29.13%)
VeracruzMain repository for the Veracruz privacy-preserving compute project.
Stars: ✭ 71 (-31.07%)
Ossf Cve BenchmarkThe OpenSSF CVE Benchmark consists of code and metadata for over 200 real life CVEs, as well as tooling to analyze the vulnerable codebases using a variety of static analysis security testing (SAST) tools and generate reports to evaluate those tools.
Stars: ✭ 71 (-31.07%)
NitmproxyProxy server based on netty
Stars: ✭ 94 (-8.74%)
Trackray溯光 (TrackRay) 3 beta⚡渗透测试框架(资产扫描|指纹识别|暴力破解|网页爬虫|端口扫描|漏洞扫描|代码审计|AWVS|NMAP|Metasploit|SQLMap)
Stars: ✭ 1,295 (+1157.28%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+1143.69%)
Php Hyper Builtin ServerReverse proxy for PHP built-in server which supports multiprocessing and TLS/SSL encryption
Stars: ✭ 93 (-9.71%)
Base Drafts Internet-Drafts that make up the base QUIC specification
Stars: ✭ 1,270 (+1133.01%)
DotwebSimple and easy go web micro framework
Stars: ✭ 1,354 (+1214.56%)
In Spectre MeltdownThis tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/protect-against-speculative-execution-side-channel-vulnerabilities-in
Stars: ✭ 86 (-16.5%)
Wifi Spam✉️📡 Spam thousands of WiFi access points with custom SSIDs
Stars: ✭ 92 (-10.68%)
SslsplitTransparent SSL/TLS interception
Stars: ✭ 1,371 (+1231.07%)
PywsusStandalone implementation of a part of the WSUS spec. Built for offensive security purposes.
Stars: ✭ 84 (-18.45%)
Tls InspectorEasily view and inspect X.509 certificates on your iOS device.
Stars: ✭ 92 (-10.68%)
Vulstudy使用docker快速搭建各大漏洞靶场,目前可以一键搭建17个靶场。
Stars: ✭ 1,245 (+1108.74%)
Burp Unauth Checkerburpsuite extension for check unauthorized vulnerability
Stars: ✭ 99 (-3.88%)
Icingaweb2 Module X509Keeps track of certificates as they are deployed in a network environment.
Stars: ✭ 78 (-24.27%)
Docx Embeddedhtml InjectionWord 2016 vulnerability allows injecting HTML/JS code into a docx file's embeddedHTML="" tags.
Stars: ✭ 91 (-11.65%)
Acme clientJava ACME Client application
Stars: ✭ 77 (-25.24%)
Fuzz.txtPotentially dangerous files
Stars: ✭ 1,382 (+1241.75%)
Hpkpgolang hpkp client library
Stars: ✭ 73 (-29.13%)
Audit Check🛡️ GitHub Action for security audits
Stars: ✭ 90 (-12.62%)
Hacker ezinesA collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (-30.1%)
MinimalftpA lightweight, simple FTP server. Pure Java, no dependencies.
Stars: ✭ 94 (-8.74%)
Esp8266workshopIoT workshop based on ESP8266, a DHT11/22 and neopixel RGB LED
Stars: ✭ 71 (-31.07%)
Pax💀 🔓 CLI tool for PKCS7 padding oracle attacks
Stars: ✭ 90 (-12.62%)
Zio Tls Http100% non-blocking, Java NIO only( inspired by zio-nio) , JSON HTTP server based on Scala ZIO library. Everything including TLS encryption modeled as ZIO effects, convenient route DSL similar to https4s, up to 30K TPS local JSON transaction with 25 threads on 6 cores(i7) with ZIO fibers.
Stars: ✭ 71 (-31.07%)
Gsocks5Secure SOCKS5 server in Go
Stars: ✭ 98 (-4.85%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-13.59%)
MerecatSmall and made-easy HTTP/HTTPS server based on Jef Poskanzer's thttpd
Stars: ✭ 69 (-33.01%)
BabasslA Brisk and Better Assured Cryptographic Toolkit
Stars: ✭ 68 (-33.98%)
Nitroshare DesktopNetwork file transfer application for Windows, OS X, & Linux
Stars: ✭ 1,150 (+1016.5%)
Ssl CheckerPython script that collects SSL/TLS information from hosts
Stars: ✭ 94 (-8.74%)
Terraform Provider TlsProvides utilities for working with Transport Layer Security keys and certificates. It provides resources that allow private keys, certificates and certficate requests to be created as part of a Terraform deployment.
Stars: ✭ 88 (-14.56%)
TlslibrarySimple TlsLibrary written in Kotlin - Provides DSL for creating TLS connections
Stars: ✭ 67 (-34.95%)
Vulnerability Data ArchiveWith the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Stars: ✭ 63 (-38.83%)
RvdRobot Vulnerability Database. An archive of robot vulnerabilities and bugs.
Stars: ✭ 87 (-15.53%)