Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security attack
attack
x
security
x
419 search results found
Api Security Checklist
⭐
21,061
Checklist of the most important security countermeasures when designing, testing, and releasing your API
Bettercap
⭐
14,547
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Wifiphisher
⭐
11,991
The Rogue Access Point Framework
Beef
⭐
8,760
The Browser Exploitation Framework Project
Awesome Ctf
⭐
8,347
A curated list of CTF frameworks, libraries, resources and softwares
Fuzzdb
⭐
7,234
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Infosec_reference
⭐
5,071
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Awesome Web Hacking
⭐
4,950
A list of web application security
W3af
⭐
4,142
w3af: web application attack and audit framework, the open source web vulnerability scanner.
Active Directory Exploitation Cheat Sheet
⭐
3,972
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Pacu
⭐
3,653
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Cameradar
⭐
3,451
Cameradar hacks its way into RTSP videosurveillance cameras
Attacksurfaceanalyzer
⭐
2,587
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Textattack
⭐
2,487
TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs.io/en/master/
Openrasp
⭐
2,450
🔥Open source RASP solution
Chainsaw
⭐
2,223
Rapidly Search and Hunt through Windows Forensic Artefacts
Apt_report
⭐
1,963
Interesting APT Report Collection And Some Special IOC
Zen Rails Security Checklist
⭐
1,632
Checklist of security precautions for Ruby on Rails applications.
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Hayabusa
⭐
1,533
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Tinc
⭐
1,532
a VPN daemon
Awesome Crypto Papers
⭐
1,518
A curated list of cryptography papers, articles, tutorials and howtos.
Wifipumpkin3
⭐
1,495
Powerful framework for rogue access point attack.
Ddos Ripper
⭐
1,357
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
Advbox
⭐
1,279
Advbox is a toolbox to generate adversarial examples that fool neural networks in PaddlePaddle、PyTorch、Caffe2、MxNet、Keras、TensorFlow and Advbox can benchmark the robustness of machine learning models. Advbox give a command line tool to generate adversarial examples with Zero-Coding.
Pentest Book
⭐
1,266
Awesome Iot Hacks
⭐
1,208
A Collection of Hacks in IoT Space so that we can address them (hopefully).
Intrigue Core
⭐
1,205
Discover Your Attack Surface!
Heap Exploitation
⭐
1,192
This book on heap exploitation is a guide to understanding the internals of glibc's heap and various attacks possible on the heap structure.
Nosurf
⭐
1,081
CSRF protection middleware for Go.
Goby
⭐
1,081
Attack surface mapping
My Infosec Awesome
⭐
965
My curated list of awesome links, resources and tools on infosec related topics
Breaking And Pwning Apps And Servers Aws Azure Training
⭐
885
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
Htshells
⭐
801
Self contained htaccess shells and attacks
Awesome Cybersecurity Datasets
⭐
765
A curated list of amazingly awesome Cybersecurity datasets
Graph Adversarial Learning Literature
⭐
751
A curated list of adversarial attacks and defenses papers on graph-structured data.
Noscript
⭐
693
The popular NoScript Security Suite browser extension.
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Remote Method Guesser
⭐
651
Java RMI Vulnerability Scanner
Nginx Lua Anti Ddos
⭐
649
A Anti-DDoS script to protect Nginx web servers using Lua with a HTML Javascript based authentication puzzle inspired by Cloudflare I am under attack mode an Anti-DDoS authentication page protect yourself from every attack type All Layer 7 Attacks Mitigating Historic Attacks DoS DoS Implications DDoS All Brute Force Attacks Zero day exploits Social Engineering Rainbow Tables Password Cracking Tools Password Lists Dictionary Attacks Time Delay Any Hosting Provider Any CMS or Custom Website Unlimi
Jwt Hack
⭐
620
🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)
Gofetch
⭐
507
GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
Wbruter
⭐
497
wbruter was the first tool wich has been released as open source wich can guarantee 100% that your pin code will be cracked aslong as usb debugging has been enable. wbruter also includes some other brute methods like dictionary attacks for gmail, ftp, rar, zip and some other file extensions.
Hacking
⭐
491
hacker, ready for more of our story ! 🚀
Ssti Payloads
⭐
465
🎯 Server Side Template Injection Payloads
Mod0burpuploadscanner
⭐
439
HTTP file upload scanner for Burp Proxy
Hackertarget
⭐
422
🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Protect
⭐
390
Proactively protect your Node.js web services
Raven Storm
⭐
389
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Sitadel
⭐
369
Web Application Security Scanner
Honeypot
⭐
349
Low interaction honeypot that displays real time attacks
Lascar
⭐
338
Ledger's Advanced Side-Channel Analysis Repository
Airgap Vault
⭐
309
The AirGap Vault is installed on a spare smartphone that has no connection to any network, thus it is air gapped. This app handles the private key.
Papers
⭐
301
Academic papers and articles that I read related to web hacking, fuzzing, etc. / 阅读过的Web安全方向、模糊测试方向的一些论文与阅读笔记
Useful_websites_for_pentester
⭐
282
This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day studies and to remain updated.
Wifi Penetration Testing Cheat Sheet
⭐
277
Work in progress...
Antiddos System
⭐
276
🛡️⚔️ Protect your web app from DDOS attack or the Dead Ping + CAPTCHA VERIFICATION in one line!
Awesome Sgx Open Source
⭐
270
A curated list of open-source projects that help exploit Intel SGX technology
Awesome Rtc Hacking
⭐
252
a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE
Backdoors101
⭐
231
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Ble Security Attack Defence
⭐
224
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Shiva
⭐
222
An Ansible playbook to provision a host for penetration testing and CTF challenges
Adversarial Explainable Ai
⭐
220
💡 Adversarial attacks on explanations and how to defend them
Sas Top 10
⭐
213
Serverless Architectures Security Top 10 Guide
Attacks On Tor
⭐
202
Thirteen Years of Tor Attacks
Camerattack
⭐
201
An attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Host Validation
⭐
187
Express.js middleware for "Host" and "Referer" header validation to protect against DNS rebinding attacks.
Mrkaplan
⭐
184
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
Lorg
⭐
173
Apache Logfile Security Analyzer
Deep Spying
⭐
173
Spying using Smartwatch and Deep Learning
Cs253.stanford.edu
⭐
171
CS 253 Web Security course at Stanford University
Http Desync Guardian
⭐
167
Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).
Pywsus
⭐
166
Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.
Beehive
⭐
156
Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
Dheater
⭐
154
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Go Agent
⭐
154
Sqreen's Application Security Management for the Go language
From Scratch
⭐
144
A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.
Subterfuge
⭐
143
Framework for Man-In-The-Middle attacks
Androidtampering
⭐
141
Android library to protect your applications against tampering attacks.
Kali Linux Tools Interface
⭐
141
Graphical Web interface developed to facilitate the use of security information tools.
Redteam Hardware Toolkit
⭐
140
🔺 Red Team Hardware Toolkit 🔺
Knob
⭐
140
Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]
Routopsy
⭐
135
Peniot
⭐
135
PENIOT: Penetration Testing Tool for IoT
Centry
⭐
135
Panic button for protection against cold boot attacks
Vaporsecurityheaders
⭐
133
Harden Your Security Headers For Vapor
Blankshield
⭐
133
Prevent reverse tabnabbing phishing attacks caused by _blank
Secml_malware
⭐
133
Create adversarial attacks against machine learning Windows malware detectors
Open Redirect Payload List
⭐
132
🎯 Open Redirect Payload List
Jwtxploiter
⭐
130
A tool to test security of json web token
Vailyn
⭐
126
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Serverless Top 10 Project
⭐
122
OWASP Serverless Top 10
Tpmgenie
⭐
120
TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules
Nailgun
⭐
116
Nailgun attack on ARM devices.
Awesome Ddos Tools
⭐
115
Collection of several DDos tools.
Awesome Deception
⭐
114
An awesome list of resources on deception-based security with honeypots and honeytokens
Hashpass
⭐
113
A simple password manager with a twist.
Waf4wordpress
⭐
112
WAF for WordPress 🔥 with 60+ security checks and weekly updates
List Of Web Application Security
⭐
107
List of web application security
Tls Redirection
⭐
102
TLS Redirection
Related Searches
Security Vulnerabilities (12,341)
Laravel Security (11,580)
Php Security (10,611)
Python Security (3,710)
Javascript Security (2,859)
Python Attack (2,253)
Html Security (2,245)
Golang Security (1,385)
Security Authentication (906)
C Security (866)
1-100 of 419 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2023 Awesome Open Source. All rights reserved.