Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack attacker
attack
x
attacker
x
81 search results found
Sql Injection Payload List
⭐
3,966
🎯 SQL Injection Payload List
Blocklist Ipsets
⭐
2,813
ipsets dynamically updated with firehol's update-ipsets.sh script
Devalue
⭐
1,866
Gets the job done when JSON.stringify can't
Slipstream
⭐
1,764
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
Understanding Csrf
⭐
1,006
What are CSRF tokens and how do they work?
Hash_extender
⭐
862
Xxe Injection Payload List
⭐
825
🎯 XML External Entity (XXE) Injection Payload List
Grapl
⭐
671
Graph platform for Detection and Response
Evilfoca
⭐
596
Tool to analyze and test security in IPv4 and IPv6 data networks
Hacking
⭐
515
hacker, ready for more of our story ! 🚀
Imagenet Adversarial Training
⭐
510
ImageNet classifier with state-of-the-art adversarial robustness
Dns Rebind Toolkit
⭐
447
A front-end JavaScript toolkit for creating DNS rebinding attacks.
Defusedxml
⭐
367
Shadowsocks
⭐
330
Redirect attack on Shadowsocks stream ciphers
Speculation Bugs
⭐
318
Docs and resources on CPU Speculative Execution bugs
Aggr Inject
⭐
268
Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Arp Spoofer
⭐
169
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Psbypassclm
⭐
166
Bypass for PowerShell Constrained Language Mode
Ripple
⭐
104
Code for the paper "Weight Poisoning Attacks on Pre-trained Models" (ACL 2020)
Mia
⭐
81
A library for running membership inference attacks against ML models
Security_examples
⭐
77
Rails application to demo CSRF, XSS, and XXE vulnerabilities and how to avoid them
Poodle
⭐
74
A Proof of Concept for the POODLE vulnerability in SSLv3
Lucid Ddos
⭐
73
A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
Stopguessing
⭐
70
A system for protecting password-based authentication systems from online-guessing attacks.
Hazana
⭐
68
package to build load tests for services (http, gRPC, tcp) by implementing an Attacker
Sentinel
⭐
64
Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect your programs against 0-day attacks or publicly known bugs.
Bluebox
⭐
50
Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049
Beast Poc
⭐
40
💪 Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389 💪
Krack
⭐
39
Return To Abort
⭐
37
return-to-abort() - Using code introspection to prevent stack-smashing
Gal
⭐
31
[ICML 2021] Information Obfuscation of Graph Neural Networks
Opensvp
⭐
30
Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.
Pam_schroedinger
⭐
25
Uncertainty for brute forcers during login.
Raindance
⭐
25
Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.
Burn Byte
⭐
25
Burn Byte is a modern and powerful DDOS Toolkit
Caa
⭐
24
The implementation of the paper [Composite Adversarial Attacks](https://arxiv.org/abs/2012.05434) in AAAI2021
Flea
⭐
24
A lightweight Lua web framework
Saml Attack Surface
⭐
24
Professos
⭐
23
PrOfESSOS is our open source implementation for fully automated Evaluation-as-a-Service for SSO. PrOfESSOS introduces a generic approach to improve the security of OpenID Connect implementations by systematically detecting vulnerabilities.
Hexpand
⭐
23
Hash Length Extension Attack
Brightid Antisybil
⭐
21
Sybil detection package for BrightID
Episode 9 Ditching Cookies For Json Web Tokens
⭐
20
Source for screencast: Ditching Cookies for JSON Web Tokens
React Oauth2 Hook
⭐
17
An entirely clientside implementation of an oauth2 implicit client, with React hooks
Filecrypt
⭐
17
Example file encryption using scrypt and NaCl for the gocrypto book.
Http Stalling Detector
⭐
16
Detect HTTP stalling attacks like slowloris with Bro
Crime Poc
⭐
16
🔪 CRIME attack PoC : a compression oracle attacks CVE-2012-4929 🔪
Rolljam Sim
⭐
15
Python simulation of "rolljam" attacks
Rsyaba
⭐
14
RSYaba Modular Brute Force Attacker
Interview_tips
⭐
12
Summary of Cyber Security interview questions I have been through, hope this helps
Low Rate Tcp Dos Attack
⭐
12
Simulating a Low-Rate TCP DoS Attack in ns-3
Web Security Interview Questions
⭐
10
🟣 Web Security Interview Questions Answered to help you get ready for your next tech interview.
Pythia
⭐
10
Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.
Mock Dao Hack
⭐
9
Simplified "DAO" contract and attacker contract to recursively exploit it
Mindmup As Attack Trees
⭐
9
Python scripts for using mindmup JSON as a medium for developing attack trees
Alfasvmlib
⭐
9
ALFASVMLib - A Matlab library for adversarial label flip attacks against SVMs
R00tz2018
⭐
9
An Intro to Cyber Security workshop
Attdef
⭐
8
Most Popular Attack and Defend Competitive A/D mode for 5 years!
Human_threat_model
⭐
8
Cve
⭐
7
A collection of vulnerabilities found through independent security research.
Smartcontracts
⭐
7
This is a repository containing smart contracts based on Ethereum and Vntchain.
Pyrisk
⭐
7
Risk with python and ncurses
Secant
⭐
7
Security Cloud Assessment Tool
Libhashsig
⭐
7
Hash based digital signatures using lazy Merkle forests and Lamport, Diffie, Winternitz, Merkle one time signatures
Starttls Everywhere
⭐
7
Enforceable TLS policies on known-good email domains
Attack Engine
⭐
7
this is an offensive security tool
Ass
⭐
6
Utility box for Java Starcraft Broodwar bots (combat sim, path finding, ...)
Mongoid Rails
⭐
6
Strong parameters integration with mongoid
Poodle
⭐
6
Working exploit code for the POODLE attack on SSLv3
Sso No Phishing
⭐
6
Webext to detect and stop phishing attacks that attempt to gather your SSO credentials
Basic And Low Level Python Network Attacks
⭐
6
Basic and low-level Python Network Attacks
Eth Reentrancy Attack Patterns
⭐
6
Re-entrancy attack patterns from our paper "Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks"
Brute Force Attacker Php
⭐
5
Brute-force attack tool for generating all possible string and executing function
Mptcp Exploit
⭐
5
Testing MPTCP vulnearibilites using MPTCP-compatible suite of scapy from repo: nimai/mptcp-scapy
Iot Securitychecker
⭐
5
IoT Security Checker is a framework for automating some IoT-related security checks
Dns Amplification Lab
⭐
5
Using Scapy for DNS amplification
Torban
⭐
5
Statistics abou the number of Bitcoin nodes connected through Tor exit nodes
Related Searches
Python Attack (2,303)
Javascript Attack (687)
Attack Adversarial (590)
Security Attack (533)
C Attack (491)
Java Attack (408)
Python Attacker (365)
C Plus Plus Attack (305)
Shell Attack (286)
Attack Ddos (285)
1-81 of 81 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.