Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack attacker
attack
x
attacker
x
264 search results found
Blocklist Ipsets
⭐
2,574
ipsets dynamically updated with firehol's update-ipsets.sh script
Slipstream
⭐
1,764
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
Devalue
⭐
1,640
Gets the job done when JSON.stringify can't
Facebook Bruteforce
⭐
1,229
Bruteforce attack on Facebook account using python script
Understanding Csrf
⭐
1,006
What are CSRF tokens and how do they work?
Sql Injection Payload List
⭐
873
🎯 SQL Injection Payload List
Hash_extender
⭐
862
Xxe Injection Payload List
⭐
825
🎯 XML External Entity (XXE) Injection Payload List
Grapl
⭐
671
Graph platform for Detection and Response
Evilfoca
⭐
596
Tool to analyze and test security in IPv4 and IPv6 data networks
Imagenet Adversarial Training
⭐
510
ImageNet classifier with state-of-the-art adversarial robustness
Hacking
⭐
491
hacker, ready for more of our story ! 🚀
Ssti Payloads
⭐
465
🎯 Server Side Template Injection Payloads
Dns Rebind Toolkit
⭐
447
A front-end JavaScript toolkit for creating DNS rebinding attacks.
Impulse
⭐
379
💣 Impulse Denial-of-service ToolKit
Lascar
⭐
338
Ledger's Advanced Side-Channel Analysis Repository
Shadowsocks
⭐
330
Redirect attack on Shadowsocks stream ciphers
Speculation Bugs
⭐
318
Docs and resources on CPU Speculative Execution bugs
Defusedxml
⭐
309
Ruby Mmo
⭐
275
Ruby MMO: massively multiplayer online programming challenge
Aggr Inject
⭐
268
Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Armor
⭐
238
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Spectre Attack Sgx
⭐
203
Spectre attack against SGX enclave
Arp Spoofer
⭐
169
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Psbypassclm
⭐
166
Bypass for PowerShell Constrained Language Mode
Tpmgenie
⭐
120
TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules
Ripple
⭐
104
Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)
Copycat
⭐
103
Universal MITM web server
Clang Cfi Bypass Techniques
⭐
90
Exploitation techniques to bypass Clang CFI when applied to Chromium
Tcp_exploit
⭐
89
Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secret
Mia
⭐
81
A library for running membership inference attacks against ML models
Security_examples
⭐
77
Rails application to demo CSRF, XSS, and XXE vulnerabilities and how to avoid them
Poodle
⭐
74
A Proof of Concept for the POODLE vulnerability in SSLv3
Stopguessing
⭐
70
A system for protecting password-based authentication systems from online-guessing attacks.
Hazana
⭐
68
package to build load tests for services (http, gRPC, tcp) by implementing an Attacker
Sentinel
⭐
64
Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect your programs against 0-day attacks or publicly known bugs.
Bcc
⭐
58
An IPP tool to Man-in-the-Middle all traffic to a local printer
Network Attacker
⭐
57
Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attack "
Lucid Ddos
⭐
56
A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
Robgan
⭐
51
Rob-GAN: Generator, Discriminator and Adversarial Attacker
Bluebox
⭐
50
Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049
Ctfsubmitter
⭐
48
A flag submitter service with distributed attackers for attack/defense CTF games.
Minerinthemiddle
⭐
44
Beast Poc
⭐
40
💪 Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389 💪
Krack
⭐
39
Nrp
⭐
37
Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)
Csrf
⭐
37
A package to add protection to Vapor against CSRF attacks.
Return To Abort
⭐
37
return-to-abort() - Using code introspection to prevent stack-smashing
Honeytrap
⭐
34
Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner
Gal
⭐
31
[ICML 2021] Information Obfuscation of Graph Neural Networks
Opensvp
⭐
30
Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.
Burn Byte
⭐
25
Burn Byte is a modern and powerful DDOS Toolkit
Raindance
⭐
25
Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.
Pam_schroedinger
⭐
25
Uncertainty for brute forcers during login.
Flea
⭐
24
A lightweight Lua web framework
Caa
⭐
24
The implementation of the paper [Composite Adversarial Attacks](https://arxiv.org/abs/2012.05434) in AAAI2021
Saml Attack Surface
⭐
24
Hexpand
⭐
23
Hash Length Extension Attack
Professos
⭐
23
PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach to improve the security of OpenID Connect implementations by systematically detecting vulnerabilities.
Brightid Antisybil
⭐
21
Sybil detection package for BrightID
Episode 9 Ditching Cookies For Json Web Tokens
⭐
20
Source for screencast: Ditching Cookies for JSON Web Tokens
Ospy_rat
⭐
19
Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c
React Oauth2 Hook
⭐
17
An entirely clientside implementation of an oauth2 implicit client, with React hooks
Filecrypt
⭐
17
Example file encryption using scrypt and NaCl for the gocrypto book.
Qrljacking
⭐
16
Tool For Termux and Linux Whatsapp Hacking
Http Stalling Detector
⭐
16
Detect HTTP stalling attacks like slowloris with Bro
Crime Poc
⭐
16
🔪 CRIME attack PoC : a compression oracle attacks CVE-2012-4929 🔪
Killer Htaccess
⭐
15
Secure your server, protect your web apps, load your sites faster, avoid malware, block malicious code, be Happy
Rolljam Sim
⭐
15
Python simulation of "rolljam" attacks
Toucan Ids
⭐
15
An Intrusion Detection System written in Python
Beefpurloin
⭐
15
Exploits USB HID to steal passwords saved in Google Chrome
Rsyaba
⭐
14
RSYaba Modular Brute Force Attacker
Hover_with_power
⭐
13
This repo is dedicated to a powerpoint exploit
Low Rate Tcp Dos Attack
⭐
12
Simulating a Low-Rate TCP DoS Attack in ns-3
Interview_tips
⭐
12
Summary of Cyber Security interview questions I have been through, hope this helps
Delilah
⭐
12
Csrf Demo
⭐
11
Pythia
⭐
10
Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.
Self Healing_freertos
⭐
10
A self-healing FreeRTOS based on ARM TrustZone
Jdos
⭐
10
This is a DDOS program, fully written in Java.
Fail2ban Analyse
⭐
10
Performs analysis of Fail2ban logs and outputs data in CSV, PNG and text formats plus a map overlay of IPs
Cloudhound
⭐
10
CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to detect original Server's IP
R00tz2018
⭐
9
An Intro to Cyber Security workshop
Mock Dao Hack
⭐
9
Simplified "DAO" contract and attacker contract to recursively exploit it
Mindmup As Attack Trees
⭐
9
Python scripts for using mindmup JSON as a medium for developing attack trees
Alfasvmlib
⭐
9
ALFASVMLib - A Matlab library for adversarial label flip attacks against SVMs
Sip2ban.github.io
⭐
9
Avoided SIP and RTP attackers in Asterisk, FreeSwitch and OpenSIPS
Denial Of App Attack
⭐
8
Denial-Of-App Attack
Attdef
⭐
8
Most Popular Attack and Defend Competitive A/D mode for 5 years!
Human_threat_model
⭐
8
Scam
⭐
8
Side-Channel Attack Monitoring and Mitigation
Pyrisk
⭐
7
Risk with python and ncurses
Cve
⭐
7
A collection of vulnerabilities found through independent security research.
Attack Engine
⭐
7
this is an offensive security tool
Slack
⭐
7
Slack Tunneling for On-Site Attack-Defend CTFs
Smartcontracts
⭐
7
This is a repository containing smart contracts based on Ethereum and Vntchain.
Secant
⭐
7
Security Cloud Assessment Tool
Jamming And Replay
⭐
7
A jamming-and-replay attack using SDR
Rse Adversarial Defense
⭐
7
An implementation for "Defense of Word-level Adversarial Attacks via Random Substitution Encoding"
Related Searches
Python Attack (2,303)
Javascript Attack (687)
Attack Adversarial (590)
Security Attack (533)
C Attack (491)
Java Attack (408)
Python Attacker (373)
C Plus Plus Attack (305)
Network Attack (299)
Jupyter Notebook Attack (297)
1-100 of 264 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2023 Awesome Open Source. All rights reserved.