This Metasploit module implements the OpenSSL Heartbleed attack. The problem exists in the handling of heartbeat requests, where a fake length can be used to leak memory data in the response. Services that support STARTTLS may also be vulnerable.
81d080e43dc83f3e3ee46722a1679f1f403475e40beef0b849082092202ffa5c
OpenSSL TLS Heartbeat extension memory disclosure proof of concept. Expansion of the original exploit from Jared Stafford - this one supports multiple SSL/TLS versions.
eacf96cd5f65b639ffd1574293f581a43f690b7ab4f4237f23f7ea69179e7347
This python script is a modification of the heartbleed proof of concept exploit that looks for cookies, specifically user sessions.
6be146c172695396122c8d40d4638e904f2ee1a827bd6f5062014ed22f051f9f
This memory disclosure exploit is a quick and dirty demonstration of the TLS heartbeat extension vulnerability.
52f0798dad98c4a1b6cab83a8eda203099ba005a12190fde8917fba6bb4fbe85
This is a modified version of ssltest.py that will do a mass scan for the Heartbleed TLS heartbeat vulnerability.
82c6e88d81229fdc66b6164151c0633d131f032bbe9893c23498032d22ddb017
This exploit is a quick and dirty demonstration of the Heartbleed TLS vulnerability.
0415e43e7ef638d6c409ac662bd691d4eaf202ca6d154493d8cc75be1e929801