Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security attack
attack
x
security
x
232 search results found
Api Security Checklist
⭐
21,626
Checklist of the most important security countermeasures when designing, testing, and releasing your API
Beef
⭐
9,150
The Browser Exploitation Framework Project
Fuzzdb
⭐
7,703
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Awesome Web Hacking
⭐
5,260
A list of web application security
W3af
⭐
4,142
w3af: web application attack and audit framework, the open source web vulnerability scanner.
Pacu
⭐
3,879
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Chainsaw
⭐
3,077
Rapidly Search and Hunt through Windows Forensic Artefacts
Openrasp
⭐
2,638
🔥Open source RASP solution
Attacksurfaceanalyzer
⭐
2,616
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Apt_report
⭐
2,078
Interesting APT Report Collection And Some Special IOC
Tinc
⭐
1,810
a VPN daemon
Ddos Ripper
⭐
1,773
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
Zen Rails Security Checklist
⭐
1,632
Checklist of security precautions for Ruby on Rails applications.
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Awesome Crypto Papers
⭐
1,518
A curated list of cryptography papers, articles, tutorials and howtos.
Pentest Book
⭐
1,371
Awesome Iot Hacks
⭐
1,208
A Collection of Hacks in IoT Space so that we can address them (hopefully).
Intrigue Core
⭐
1,205
Discover Your Attack Surface!
Nosurf
⭐
1,081
CSRF protection middleware for Go.
My Infosec Awesome
⭐
983
My curated list of awesome links, resources and tools on infosec related topics
Htshells
⭐
801
Self contained htaccess shells and attacks
Awesome Cybersecurity Datasets
⭐
765
A curated list of amazingly awesome Cybersecurity datasets
Remote Method Guesser
⭐
746
Java RMI Vulnerability Scanner
Noscript
⭐
742
The popular NoScript Security Suite browser extension.
Hacking
⭐
515
hacker, ready for more of our story ! 🚀
Gofetch
⭐
507
GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
Raven Storm
⭐
475
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Protect
⭐
390
Proactively protect your Node.js web services
Papers
⭐
334
Academic papers and articles that I read related to web hacking, fuzzing, etc. / 阅读过的Web安全方向、模糊测试方向的一些论文与阅读笔记
Airgap Vault
⭐
332
The AirGap Vault is installed on a spare smartphone that has no connection to any network, thus it is air gapped. This app handles the private key.
Useful_websites_for_pentester
⭐
324
This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day studies and to remain updated.
Wifi Penetration Testing Cheat Sheet
⭐
277
Work in progress...
Awesome Rtc Hacking
⭐
252
a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE
Adversarial Explainable Ai
⭐
235
💡 Adversarial attacks on explanations and how to defend them
Ble Security Attack Defence
⭐
224
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Shiva
⭐
222
An Ansible playbook to provision a host for penetration testing and CTF challenges
Sas Top 10
⭐
213
Serverless Architectures Security Top 10 Guide
Attacks On Tor
⭐
202
Thirteen Years of Tor Attacks
Camerattack
⭐
201
An attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Mrkaplan
⭐
200
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
Host Validation
⭐
187
Express.js middleware for "Host" and "Referer" header validation to protect against DNS rebinding attacks.
Lorg
⭐
173
Apache Logfile Security Analyzer
Deep Spying
⭐
173
Spying using Smartwatch and Deep Learning
Cs253.stanford.edu
⭐
171
CS 253 Web Security course at Stanford University
Dheater
⭐
168
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
Secml_malware
⭐
168
Create adversarial attacks against machine learning Windows malware detectors
Http Desync Guardian
⭐
167
Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).
Pywsus
⭐
166
Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.
Beehive
⭐
156
Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
Go Agent
⭐
154
Sqreen's Application Security Management for the Go language
Subterfuge
⭐
143
Framework for Man-In-The-Middle attacks
Kali Linux Tools Interface
⭐
141
Graphical Web interface developed to facilitate the use of security information tools.
Androidtampering
⭐
141
Android library to protect your applications against tampering attacks.
Redteam Hardware Toolkit
⭐
140
🔺 Red Team Hardware Toolkit 🔺
Routopsy
⭐
135
Peniot
⭐
135
PENIOT: Penetration Testing Tool for IoT
Blankshield
⭐
133
Prevent reverse tabnabbing phishing attacks caused by _blank
Open Redirect Payload List
⭐
132
🎯 Open Redirect Payload List
Jwtxploiter
⭐
130
A tool to test security of json web token
Vailyn
⭐
126
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Awesome Deception
⭐
114
An awesome list of resources on deception-based security with honeypots and honeytokens
Hashpass
⭐
113
A simple password manager with a twist.
Waf4wordpress
⭐
112
WAF for WordPress 🔥 with 60+ security checks and weekly updates
List Of Web Application Security
⭐
107
List of web application security
Node Fast Ratelimit
⭐
105
☔ Fast and efficient in-memory rate-limit for Node, used to alleviate most common DOS attacks.
Tls Redirection
⭐
102
TLS Redirection
Slowloris
⭐
89
Asynchronous Python implementation of SlowLoris DoS attack
Awesome Httprequestsmuggling
⭐
85
A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻
Awesome Wifi Security
⭐
79
A collection of awesome resources related to 802.11 security, tools and other things
Phishing Website Detection
⭐
78
It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Python
Auditd Attack
⭐
72
A Linux Auditd rule set mapped to MITRE's Attack Framework
Http Protection
⭐
72
This library protects against typical web attacks. It was inspired in rack-protection Ruby gem.
Software Security Paper List
⭐
71
Pentest Bookmarkz
⭐
67
A collection of useful links for Pentesters
Radio Hackbox
⭐
67
PoC tool to demonstrate vulnerabilities in wireless input devices
Bias
⭐
66
Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]
Jpeg Defense
⭐
65
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Secacademic
⭐
64
记录我的安全学术学习
Logingatebundle
⭐
58
Chall.stypr.com
⭐
57
Stereotyped Challenges (2014~2023)
Strong Lumen
⭐
54
A Security-Centric Lumen Starter Kit
Phaser
⭐
53
Automated attack surface mapper and vulnerability scanner (Work In Progress 🚧)
Android Clipboard Security
⭐
53
A project demonstrating a security hole In Android's API that allows any installed application to listen to changes to the clipboard (listen to everything that you copy and paste).
Rfd Checker
⭐
53
RFD Checker - security CLI tool to test Reflected File Download issues
Cfautouam
⭐
53
Automatically enables CloudFlare Under Attack Mode - Bash Script
Wordpress Saml
⭐
52
OneLogin SAML plugin for Wordpress
Kaiser
⭐
50
Fileless persistence, attacks and anti-forensic capabilties.
Attack Surface Detector Burp
⭐
50
The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Xssmap
⭐
49
Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Node Security
⭐
47
Slides/Notes from my talk on Security Best Practices with Node.js https://www.youtube.com/watch?v=qBLgykeA3Mo
Checkurl
⭐
46
Detect evil urls that uses IDN Homograph Attack.
Typhooncon2019
⭐
43
TyphoonCon 2019
Awesome Tls Hacks
⭐
42
A collection of SSL/TLS security related resources.
Linux Security Papers
⭐
40
Research paper collection for Linux kernel security from top security conferences.
Gatsby Plugin Csp
⭐
40
A Gatsby plugin which adds strict Content Security Policy to your project.
Topera
⭐
39
IPv6 analysis tool: the other side
Quijote
⭐
39
Quijote is an highly configurable HTTP middleware for API security.
Bsidessf 2020 Workshop
⭐
39
Materials for a live workshop at BSidesSF on deployment-level Kubernetes security controls
Linux Rootkits Red Blue Teams
⭐
37
Linux Rootkits (4.x Kernel)
Hackable
⭐
37
A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks
Related Searches
Security Vulnerabilities (12,295)
Laravel Security (11,580)
Php Security (10,611)
Javascript Security (2,969)
Html Security (2,284)
Python Attack (2,266)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
1-100 of 232 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2025 Awesome Open Source. All rights reserved.