Skip to content

Instantly share code, notes, and snippets.

Avatar

Ben Holland benjholla

View GitHub Profile
@benjholla
benjholla / heartbleed-session-tokens.py
Last active Jul 5, 2018 — forked from mpdavis/heartbleed-altered.py
A modified heartbleed exploit to extract likely session token strings
View heartbleed-session-tokens.py
#!/usr/bin/python
# Connects to servers vulnerable to CVE-2014-0160 and looks for cookies, specifically user sessions.
# Michael Davis (mike.philip.davis@gmail.com)
# Based almost entirely on the quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org)
# The author disclaims copyright to this source code.
import select
You can’t perform that action at this time.