Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python attack
attack
x
python
x
1,109 search results found
Rogue
⭐
269
An extensible toolkit providing penetration testers an easy-to-use platform to deploy Access Points during penetration testing and red team engagements.
Aggr Inject
⭐
268
Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.
Pina Colada
⭐
261
A powerful and extensible wireless drop box
Trojanzoo
⭐
260
TrojanZoo provides a universal pytorch platform to conduct security researches (especially backdoor attacks/defenses) of image classification in deep learning.
Jwtcat
⭐
258
A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Mr.sip
⭐
257
SIP-Based Audit and Attack Tool
Falcongate
⭐
255
A smart gateway to stop cyber criminals - Sponsored by Falcon Guard
Attack Stix Data
⭐
254
STIX data representing MITRE ATT&CK
Steal Ml
⭐
250
Model extraction attacks on Machine-Learning-as-a-Service platforms.
Universal Triggers
⭐
247
Universal Adversarial Triggers for Attacking and Analyzing NLP (EMNLP 2019)
Badusb2 Mitm Poc
⭐
241
BadUSB 2.0 USB-HID MiTM POC
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Bane
⭐
232
The "bane" Python library stands out as a robust toolkit catering to a wide spectrum of cybersecurity and networking tasks. Its versatile range of functionalities covers various aspects, including bruteforce attacks, cryptographic methods, DDoS attacks, information gathering, botnet creation and management, and CMS vulnerability scanning and more..
Backdoors101
⭐
231
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Audio_adversarial_examples
⭐
230
Targeted Adversarial Examples on Speech-to-Text systems
Known_hosts Hashcat
⭐
229
A guide and tool for cracking ssh known_hosts files with hashcat
Ntlmrelaytoews
⭐
226
ntlm relay attack to Exchange Web Services
Ble Security Attack Defence
⭐
224
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Shiva
⭐
222
An Ansible playbook to provision a host for penetration testing and CTF challenges
Dictionaries
⭐
217
Misc dictionaries for directory/file enumeration, username enumeration, password dictionary/bruteforce attacks
Pro Gnn
⭐
213
Implementation of the KDD 2020 paper "Graph Structure Learning for Robust Graph Neural Networks"
Pikarma
⭐
211
📡🍓🍍 Detects wireless network attacks performed by KARMA module (fake AP). Starts deauthentication attack (for fake access points)
Ardt
⭐
210
Akamai Reflective DDoS Tool - Attack the origin host behind the Akamai Edge hosts and DDoS protection offered by Akamai services.
Dba
⭐
210
Detection by Attack: Detecting Adversarial Samples by Undercover Attack
Tensorflow Adversarial
⭐
204
Crafting adversarial images
Hadoop Attack Library
⭐
200
A collection of pentest tools and resources targeting Hadoop environments
Tor_ip_switcher
⭐
200
tor_ip_switcher is useful for making any DoS attack look like a DDoS attack. Works with toriptables2.
Pastejacker
⭐
200
Hacking systems with the automation of PasteJacking attacks.
Ghost Phisher
⭐
196
Automatically exported from code.google.com/p/ghost-phisher
Hulk V3
⭐
193
Asynchronous HTTP Botnet for Distributed Denial of Service (DDoS)
Killchain
⭐
192
A unified console to perform the "kill chain" stages of attacks.
Macphish
⭐
189
Office for Mac Macro Payload Generator
Nettack
⭐
187
Implementation of the paper "Adversarial Attacks on Neural Networks for Graph Data".
Flask Seasurf
⭐
179
SeaSurf is a Flask extension for preventing cross-site request forgery (CSRF).
Krackdetector
⭐
176
Detect and prevent KRACK attacks in your network
Pisavar
⭐
176
📡 🍍Detects activities of PineAP module and starts deauthentication attack (for fake access points - WiFi Pineapple Activities Detection)
Tangled Curl
⭐
173
IOTA's hash function curl is broken
Deep Spying
⭐
173
Spying using Smartwatch and Deep Learning
Csrft
⭐
173
A lightweight CSRF Toolkit for easy Proof of concept
Privacyraven
⭐
172
Privacy Testing for Deep Learning
Arp Spoofer
⭐
169
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Ridenum
⭐
169
Rid_enum is a null session RID cycle attack for brute forcing domain controllers.
Secml_malware
⭐
168
Create adversarial attacks against machine learning Windows malware detectors
Diffai
⭐
167
A certifiable defense against adversarial examples by training neural networks to be provably robust
Pywsus
⭐
166
Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.
Ctf Crypto
⭐
165
Contains tools for solving RSA and other crypto problems in CTFs.
Guided Denoise
⭐
165
The winning submission for NIPS 2017: Defense Against Adversarial Attack of team TSAIL
Defensegan
⭐
164
Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models (published in ICLR2018)
Air Hammer
⭐
162
Simple Blackbox Attack
⭐
161
Code for ICML 2019 paper "Simple Black-box Adversarial Attacks"
Robustdg
⭐
160
Toolkit for building machine learning models that generalize to unseen domains and are robust to privacy and other attacks.
Ddos Attack
⭐
160
This script is designed for educational purposes only and allows users to simulate a DDoS attack. Please note that hacking is illegal and this script should not be used for any malicious activities. It is intended to help users better understand how DDoS attacks work and how to protect their systems from such attacks.
Pimage
⭐
160
Python package for detecting copy-move attack on a digital image
Non Targeted Adversarial Attacks
⭐
159
A non-targeted adversarial attack method, which won the first place in NIPS 2017 non-targeted adversarial attacks competition
Email Bomber
⭐
157
Spam emails
Dymerge
⭐
157
🔓 A dynamic dictionary merger for successful dictionary based attacks.
Python Botnet
⭐
157
This is a simple DDoS python botnet script with remote monitoring & management with backdoor built-in for education purposes.
Beehive
⭐
156
Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
Confusable_homoglyphs
⭐
156
ϲοnfuѕаblе_һοmоɡlyphs
Jem
⭐
154
Project site for "Your Classifier is Secretly an Energy-Based Model and You Should Treat it Like One"
Worldsfirstsha2vulnerability
⭐
153
Sha256 vulnerability for full rounds. Circular hash attack.
Nosqlattack
⭐
152
NoSQLAttack is an open source Python tool to automate exploit MongoDB server IP on Internet and disclose the database data by MongoDB default configuration weaknesses and injection attacks.
Gmail Hack
⭐
152
Gmail account using brute force attack
Osueta
⭐
151
A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.
Spoofing_detection
⭐
150
Cork/Face Presentation Attack Detection
Gmailbruterv2
⭐
150
Simple tool written in python3 to perform limited brute-force attacks on gmail accounts.
R00kie Kr00kie
⭐
148
PoC exploit for the CVE-2019-15126 kr00k vulnerability
Shimit
⭐
145
A tool that implements the Golden SAML attack
Misp Maltego
⭐
145
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Hyperfas
⭐
143
静默活体检测 Silent Face Anti-Spoofing Attack Detection
Wifi Deauth Attack
⭐
141
An automated script for deauthentication attack
Knob
⭐
140
Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]
Routopsy
⭐
135
Centry
⭐
135
Panic button for protection against cold boot attacks
Aletheia
⭐
135
An open-source toolbox for steganalysis
Peniot
⭐
135
PENIOT: Penetration Testing Tool for IoT
Nips17 Adversarial Attack
⭐
133
Submission to Kaggle NIPS'17 competition on adversarial examples (non-targeted adversarial attack track)
Offensive Dockerfiles
⭐
132
Offensive tools as Dockerfiles. Lightweight & Ready to go
Bruteforce Bitcoin Brainwallet
⭐
132
Bruteforce dictionary attack on bitcoin brain wallets
Jwtxploiter
⭐
130
A tool to test security of json web token
Attack_monitor
⭐
128
Endpoint detection & Malware analysis software
Vailyn
⭐
126
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Translation Invariant Attacks
⭐
125
The translation-invariant adversarial attack method to improve the transferability of adversarial examples.
Adversarial Library
⭐
123
Library containing PyTorch implementations of various adversarial attacks and resources
Zoo Attack
⭐
123
ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks
Blackhat17 Pocs
⭐
123
Proof of concepts of attacks against Wi-Fi implementations
Raw Packet
⭐
122
Raw-packet Project
Modelpoisoning
⭐
121
Code for "Analyzing Federated Learning through an Adversarial Lens" https://arxiv.org/abs/1811.12470
Url Obfuscator
⭐
120
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Casia Surf_cefa
⭐
120
Face Anti-spoofing Attack Detection Challenge@CVPR2020
Fb Brute
⭐
119
facebook-cracker Facebook Cracker Version 1.0 can crack into Facebook Database 100% without Interruption By Facebook Firewall This program is for educational purposes only. Don't attack people facebook accounts it's illegal ! If you want to crack into someone's account, you must have the permission of the user. Mauritania Attacker is not responsible Whit is a facebook-cracker I have written lots of facebook hacking art icle like hack facebook using android smartphone,open source tools,python and
Fast_adversarial
⭐
118
Code for the CVPR 2019 article "Decoupling Direction and Norm for Efficient Gradient-Based L2 Adversarial Attacks and Defenses"
Pyxiewps
⭐
118
Pyxiewps is a wireless attack tool to retrieve the WPS pin in seconds.
Awesome Ddos Tools
⭐
115
Collection of several DDos tools.
Roguehostapd
⭐
115
Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.
Aoyama
⭐
114
A New version of Python3 botnet, old version: http://github.com/Leeon123/Python3-botnet
Instagram Py
⭐
113
Poisoning Benchmark
⭐
113
A unified benchmark problem for data poisoning attacks
Url Sandbox
⭐
113
Scalable URL Sandbox for analyzing URLs and Domains from phishing attacks
Wi Toolkit
⭐
112
Hack WiFi in Termux ( ROOTED DEVICES ONLY)
Related Searches
Python Dataset (14,792)
Python Machine Learning (14,099)
Python Tensorflow (13,736)
Python Network (11,495)
Python Algorithms (10,033)
Python Testing (9,479)
Python Natural Language Processing (9,064)
Python Artificial Intelligence (8,580)
Python Amazon Web Services (8,117)
Python Pytorch (7,877)
101-200 of 1,109 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.