Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack
attack
x
2,965 search results found
Hackingtool
⭐
40,968
ALL IN ONE Hacking Tool For Hackers
Vegeta
⭐
22,417
HTTP load testing tool and library. It's over 9000!
Api Security Checklist
⭐
21,626
Checklist of the most important security countermeasures when designing, testing, and releasing your API
Bettercap
⭐
15,224
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Esp8266_deauther
⭐
12,814
Affordable WiFi hacking platform for testing and learning
Wifiphisher
⭐
12,656
The Rogue Access Point Framework
Mhddos
⭐
11,092
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Wifi Cracking
⭐
10,714
Crack WPA/WPA2 Wi-Fi Routers with Airodump-ng and Aircrack-ng/Hashcat
Social Engineer Toolkit
⭐
9,677
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.
Beef
⭐
9,150
The Browser Exploitation Framework Project
Gremlins.js
⭐
8,908
Monkey testing library for web apps and Node.js
Evilginx2
⭐
8,747
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
Fuzzdb
⭐
7,703
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Beeswithmachineguns
⭐
5,845
A utility for arming (creating) many bees (micro EC2 instances) to attack (load test) targets (web applications).
Wifite2
⭐
5,709
Rewrite of the popular wireless network auditor, "wifite"
Awesome Web Hacking
⭐
5,260
A list of web application security
Rails Api
⭐
5,200
Rails for API only applications
Scan4all
⭐
4,909
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
Uncaptcha2
⭐
4,704
defeating the latest version of ReCaptcha with 91% accuracy
Active Directory Exploitation Cheat Sheet
⭐
4,672
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Adversarial Robustness Toolbox
⭐
4,420
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Dnstwist
⭐
4,285
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation
Fluxion
⭐
4,273
Fluxion is a remake of linset by vk496 with enhanced functionality.
Swiftsoup
⭐
4,203
SwiftSoup: Pure Swift HTML Parser, with best of DOM, CSS, and jquery (Supports Linux, iOS, Mac, tvOS, watchOS)
W3af
⭐
4,142
w3af: web application attack and audit framework, the open source web vulnerability scanner.
Web Attack Cheat Sheet
⭐
3,974
Web Attack Cheat Sheet
Sql Injection Payload List
⭐
3,966
🎯 SQL Injection Payload List
Pacu
⭐
3,879
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Unicorn
⭐
3,583
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique presented by David Kennedy (TrustedSec) and Josh Kelly at Defcon 18.
Ali
⭐
3,533
Generate HTTP load and plot the results in real-time
Intruderpayloads
⭐
3,526
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Aptnotes
⭐
3,352
Various public documents, whitepapers and articles about APT campaigns
Apt_cybercriminal_campagin_collections
⭐
3,307
APT & CyberCriminal Campaign Collection
Payloads
⭐
3,289
Git All the Payloads! A collection of web attack payloads.
Cdk
⭐
3,267
📦 Make security testing of K8s, Docker, and Containerd easier.
Blocklist Ipsets
⭐
2,813
ipsets dynamically updated with firehol's update-ipsets.sh script
Ysoserial.net
⭐
2,749
Deserialization payload generator for a variety of .NET formatters
Wycheproof
⭐
2,678
Project Wycheproof tests crypto libraries against known attacks.
Collisions
⭐
2,661
Hash collisions and exploitations
Uncaptcha
⭐
2,646
Defeating Google's audio reCaptcha with 85% accuracy.
Openrasp
⭐
2,638
🔥Open source RASP solution
Attacksurfaceanalyzer
⭐
2,616
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Foolbox
⭐
2,600
A Python toolbox to create adversarial examples that fool neural networks in PyTorch, TensorFlow, and JAX
Textattack
⭐
2,597
TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs.io/en/master/
Awesome Termux Hacking
⭐
2,550
⚡️An awesome list of the best Termux hacking tools
Chainsaw
⭐
2,519
Rapidly Search and Hunt through Windows Forensic Artefacts
Socialbox Termux
⭐
2,487
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux on android
Firesheep
⭐
2,222
A Firefox extension that demonstrates HTTP session hijacking attacks.
Kickthemout
⭐
2,166
💤 Kick devices off your network by performing an ARP Spoof attack.
Apt_report
⭐
2,078
Interesting APT Report Collection And Some Special IOC
Attack_range
⭐
1,874
A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data into Splunk
Devalue
⭐
1,866
Gets the job done when JSON.stringify can't
Eaphammer
⭐
1,832
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Tinc
⭐
1,810
a VPN daemon
Hayabusa
⭐
1,800
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Attack Navigator
⭐
1,791
Web app that provides basic navigation and annotation of ATT&CK matrices
Azuread Attack Defense
⭐
1,773
This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected.
Ddos Ripper
⭐
1,773
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
Slipstream
⭐
1,764
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
Wifipumpkin3
⭐
1,653
Powerful framework for rogue access point attack.
Zen Rails Security Checklist
⭐
1,632
Checklist of security precautions for Ruby on Rails applications.
Cti
⭐
1,561
Cyber Threat Intelligence Repository expressed in STIX 2.0
Awesome Cryptoeconomics
⭐
1,551
An awesome curated list of Cryptoeconomic research and learning materials
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Reaver Wps Fork T6x
⭐
1,520
Hate_crack
⭐
1,518
A tool for automating cracking methodologies through Hashcat from the TrustedSec team.
Awesome Crypto Papers
⭐
1,518
A curated list of cryptography papers, articles, tutorials and howtos.
Sslstrip
⭐
1,455
A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.
Ighack
⭐
1,448
Hack Instagram From Termux With Help of Tor
Awesome Adversarial Machine Learning
⭐
1,445
A curated list of awesome adversarial machine learning resources
Wi Pwn
⭐
1,434
ESP8266 firmware for performing deauthentication attacks, with ease.
Taadpapers
⭐
1,413
Must-read Papers on Textual Adversarial Attack and Defense
Facebook Bruteforce
⭐
1,396
Bruteforce attack on Facebook account using python script
Slowhttptest
⭐
1,395
Application Layer DoS attack simulator
Pentest Book
⭐
1,371
Ddos Attack
⭐
1,358
DDos-Attack Is A Python script online Attack
Bkcrack
⭐
1,316
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Socialbox
⭐
1,298
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi
Awesome Iot Hacks
⭐
1,208
A Collection of Hacks in IoT Space so that we can address them (hopefully).
Intrigue Core
⭐
1,205
Discover Your Attack Surface!
Chimera
⭐
1,192
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Vulnerable Ad
⭐
1,134
Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab
Awesome Cobaltstrike Defence
⭐
1,090
Defences against Cobalt Strike
Goby
⭐
1,081
Attack surface mapping
Nosurf
⭐
1,081
CSRF protection middleware for Go.
Hashpump
⭐
1,080
A tool to exploit the hash length extension attack in various hashing algorithms
One Pixel Attack Keras
⭐
1,078
Keras implementation of "One pixel attack for fooling deep neural networks" using differential evolution on Cifar10 and ImageNet
Peirates
⭐
1,077
Peirates - Kubernetes Penetration Testing tool
Wifi Arsenal
⭐
1,049
WiFi arsenal
Autordpwn
⭐
1,043
The Shadow Attack Framework
Infernal Twin
⭐
1,027
wireless hacking - This is automated wireless hacking tool
Fern Wifi Cracker
⭐
1,024
Automatically exported from code.google.com/p/fern-wifi-cracker
Awesome Redteam Cheatsheet
⭐
1,017
Red Team Cheatsheet in constant expansion.
Fuzzdb
⭐
1,008
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Understanding Csrf
⭐
1,006
What are CSRF tokens and how do they work?
Mana
⭐
1,000
*DEPRECATED* mana toolkit for wifi rogue AP attacks and MitM
Fwknop
⭐
998
Single Packet Authorization > Port Knocking
My Infosec Awesome
⭐
983
My curated list of awesome links, resources and tools on infosec related topics
Pewpew
⭐
971
⭐ ⭐ ⭐ Build your own IP Attack Maps with SOUND!
Waf Bypass
⭐
970
Check your WAF before an attacker does
Related Searches
Python Attack (2,252)
Javascript Attack (693)
Attack Adversarial (590)
Security Attack (533)
C Attack (491)
Java Attack (408)
1-100 of 2,965 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.