Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign up
heartbleed
Cannot retrieve the latest commit at this time.
| Failed to load latest commit information. | |||
|
|
heartbleed-ear | ||
|
|
heartbleed-war | ||
|
|
.gitignore | ||
|
|
README | ||
|
|
README.ORIG | ||
|
|
heartbleed-poc.py | ||
|
|
openssl_heartbleed.rb | ||
|
|
pom.xml | ||
|
|
ssl-heartbleed.nse | ||
README
HeartBleed Exploit Tester
-------------------------
Python Tool
-----------
Usage: heartbleed-poc.py server [options]
Test for SSL heartbeat vulnerability (CVE-2014-0160)
Options:
-h, --help show this help message and exit
-p PORT, --port=PORT TCP port to test (default: 443)
-n NUM, --num=NUM Number of heartbeats to send if vulnerable (defines
how much memory you get back) (default: 1)
-f FILE, --file=FILE Filename to write dumped memory too (default:
dump.bin)
-q, --quiet Do not display the memory dump
-s, --starttls Check STARTTLS (smtp only right now)
Examples
--------
* Normal scan, will hit port 443, with 1 iteration:
python heartbleed-poc.py example.com