Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c attack
attack
x
c
x
222 search results found
Tsuki Sploit
⭐
24
A USB-based script for Ethical hacking with multiple attacks
Peapwn
⭐
24
Proof-of-concept implementation of the Apple relay attack in Python
Wordlist Generator
⭐
24
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Hexpand
⭐
23
Hash Length Extension Attack
Catchme
⭐
22
CatchME - WiFi Fun Box "Having Fun with ESP8266"
Snort_aipreproc
⭐
22
A preprocessor module for Snort using AI algorithms for pruning and clustering attack alarms, find out alert correlations in multi-step attacks, providing a web interface for exploring alerts and correlations, and much more
Ntsec
⭐
21
Standalone tool to explore the security model of Windows and its NT kernel. Use it to introspect privilege assignments and access right assignments, enumerate attack surfaces from the point of view of a sandboxed process, etc.
Boom Attacks
⭐
21
Proof of concepts for speculative attacks using the BOOM core (https://github.com/riscv-boom/riscv-boom)
Hash Cracker
⭐
20
V8 Hash Seed timing attack
Pved
⭐
20
Purposely Vulnerable Embedded Device
Php Hash Dos
⭐
20
A PoC hash complexity DoS against PHP
Sgx Pte
⭐
20
Telling your secrets without page faults: Stealthy page table-based attacks on enclaved execution
Meltdown
⭐
20
Demonstration of the Meltdown attack
Curl Collisions
⭐
20
An implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Ospy_rat
⭐
19
Ospy is a penetration testing tool for macOS, include keylogger, live screen catcher, reveres shell and more. Developed in c
Fast Chess
⭐
19
🐇👑 Simple chess game engine and UI
Broadkey
⭐
19
Attacks against weak 802.11 Random Number Generators
Hitag2hell
⭐
18
Brutally optimizing guess-and-determine attacks https://www.usenix.org/conference/woot18/presentat
Ndf
⭐
18
Network Defender Toolkit
Synflood
⭐
18
Start a SYN flood attack to an ip address.
Sgx Tutorial Space18
⭐
18
Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Krackattacks Pineapple
⭐
18
WPA2 Key reinstallation attack (KRACK) on the WiFi Pineapples
Xlate
⭐
18
Code to evaluate XLATE attacks as well existing cache attacks.
Thunderclap Qemu
⭐
18
Thunderclap QEMU-based network card emulation
Self Healing_freertos
⭐
17
A self-healing FreeRTOS based on ARM TrustZone
Snort
⭐
17
Snort Rules
Ddos
⭐
17
Simple dos attack utility
Buffer Overflow
⭐
17
exploit vulnerable c/c++ programms with buffer overflow attacks
Mona Timing Lib
⭐
17
Tools for timing attacks
Seedlab
⭐
17
Records & Reports for Seed-project
Lvi Lfb Attack Poc
⭐
16
This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)
Libressl Rsa Backdoor
⭐
16
LibreSSL with a backdoor in RSA key generation
Deauthsniff
⭐
16
DeauthSniff alerts users about potential WiFi deauthentication attacks.
Ropgun
⭐
16
RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using hardware performance counters.
Mirai
⭐
16
The Mirai malware modified for use on NCL/a virtual/simulated environment.
Ubic Android Wallet
⭐
16
Android wallet for UBIC
Fiked
⭐
16
Fake IKE PSK+XAUTH IPsec semi-MITM attack daemon
Teensy3.2 Projects
⭐
16
Teensy 3.2 Projects - Teensy with CMD Command Execution Attack Example 💣
Tfn2k
⭐
16
Sgx Timing
⭐
15
First practical showcase for leaking secret encryption keys from a secure SGX enclave.
Contiki Ids
⭐
15
An Intrusion Detection System for Contiki OS
Arp Dns Attacks
⭐
14
ARP spoofing, HTTP redirection, DNS spoofing and DNS forging using pcap library
Mirai Iot Botnet Source Code With Setup Guide
⭐
14
https://en.wikipedia.org/wiki/Mirai_(malware) - Source Code for Research Purposes!
Fsdefender
⭐
13
Technion CS Ransomware Project: Writing Windows Mini-Filter Driver to protect PC from Ransomware
Ddos Attack
⭐
13
This is a simple DDoS Attack tool and even a begginer hacker can use this.Just type python run.py after cloning this repository.
Hope Ripe
⭐
13
A port of the RIPE suite to RISC-V.
Csapplabs
⭐
13
My solutions for labs from Computer Science A Programmer's Perspective.
Openacc Openmp Tutorial
⭐
12
This is an advanced tutorial to OpenACC and OpenMP.
Learn To Pwn
⭐
12
learn to do pwn
Cryptopals
⭐
12
Matasano crypto challenges (http://cryptopals.com/) implemented mostly in C
Ysec Waf Nginx Module
⭐
12
A lightweight web application firewall module for nginx, which is already used in the production environment.
Tinyrl
⭐
12
A small roguelike!
Intro To Computer Systems
⭐
12
15-213计算机导论(深入理解计算机系统) lab
Faultinjectiontutorial
⭐
12
This is the code for the fault injection tutorial I wrote. Read the README for more information.
Soar Sc
⭐
11
Soar-SC, Soar Starcraft AI
Tcp_flooding_ip_spoofing
⭐
11
SYN attack with IP spoofing from random IP source address and IP source port
Pythia
⭐
10
Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.
Logjam Attack Poc
⭐
10
An implementation of the concepts behind the Logjam attack
Ddos2
⭐
10
Denial of service testing toolkit written in C
Attack Argon2i
⭐
10
An effective attack against the Argon2i hash function
Buffer Overflow Attack Adventure
⭐
10
Performing Buffer Overflow attack using stack smashing approach to obtain the shell. Given a C compiled vulnerable software, with the help of reverse engineering and debugging the attack had to be conducted to obtain the shell.
Jurischain
⭐
10
Instead of challenging the humans who are working at the terminals, it would be better to challenge the terminals themselves. It's all about balancing out the client's workload so they won't be a victim of a DDoS attack.
V8 Hash Collision Generator
⭐
9
generates hashes that can be used to test your node.js application against a vulnerabilty to hash collisions attacks
Axis
⭐
9
AXIS Botnet
Drown
⭐
9
Implementation of the DROWN attack on SSL2
Whatspayloadrce
⭐
9
Whatsapp Automatic Payload Generator [CVE-2019-11932]
Xdomain Dpa M23
⭐
9
Cross-Domain DPA Attack on SAML11
Sgxlinger
⭐
8
A side-channel attack vector based on interrupt latency against enclave execution of Intel SGX
Lop Wiedergaenger
⭐
8
Dynamic Loader Oriented Programming - Wiedergaenger PoC (Proof of Concept) on Ubuntu 16.04.5 LTS
Web Application Firewall
⭐
8
Designed and Implemented a Web Application Firewall as an Apache module that "sits" in-front of a web server. The WAF is designed to stop malicious requests from known attacks such as SQL Injection, XSS attacks and from unknown attacks by learning the legitimate traffic.
My Ctf Design
⭐
8
My CTF designs.
Paxtest Freebsd
⭐
8
Scam
⭐
8
Side-Channel Attack Monitoring and Mitigation
Tattletale
⭐
8
Compression Side Channel Attack on JPEG redacted documents.
Snapper
⭐
8
Command Line Utility to send TCP RST packets to endpoints in your WLAN (subnet)
Katori
⭐
8
💾 Network swiss knife. CLI traffic sniffer and network attacks provider. [=under development=]
Skul
⭐
8
Skul is a PoC to bruteforce the Cryptsetup implementation of Linux Unified Key Setup (LUKS).
Toorcon16
⭐
7
Assets related to the Toorcon 16 talk "Linux containers as a rapid deployment attack mechanism"
Wifi Arsenal
⭐
7
Krackplus
⭐
7
KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their devices to determine whether they are vulnerable to key reinstallation attacks, or attack those devices.
Breaking Winning Challenges Of Whibox2019
⭐
7
Ngx_http_etomc2_cc
⭐
7
ngx_http_etomc2_cc is nginx module Anti attack cc
Pqcrypto Decryption Failures
⭐
7
Scripts relating to decryption failures in PQCRYPTO schemes
Demo Cloud Native Ebpf Day
⭐
7
Various eBPF programs for tracing network connections
Socracked
⭐
7
Performs key-recovery attacks on the SoDark family of algorithms.
Libhashsig
⭐
7
Hash based digital signatures using lazy Merkle forests and Lamport, Diffie, Winternitz, Merkle one time signatures
Dedos
⭐
7
DeDOS: Declarative Dispersion-Oriented Software
Hui Wenxuan Yifan
⭐
7
Relay Attack on Vehicle Passive Keyless Entry System
Metagems
⭐
7
onion layer for MetaSploitFramework
Smartcontracts
⭐
7
This is a repository containing smart contracts based on Ethereum and Vntchain.
Secure Can Demo
⭐
6
Implementation of secure CAN network in "Power Analysis and Fault Attacks against Secure CAN: How Safe Are Your Keys?".
Samuraishodown Xmatstudio
⭐
6
Project of Samurai Shodown from the team X-Mat Studio
Ecdlp Pollardrho Gmp
⭐
6
Pollard Rho attack on ECDLP with GMP
Hardnestedgui
⭐
6
Web-based dockerised GUI for a hard nested attack on MiFare Classic Cards
Griffon Legend 3ds
⭐
6
Port to 3DS of a nice Action RPG in SNES style originally written by Syn9 in FreeBASIC
Xcracker
⭐
6
simple password cracker
Scale Hw
⭐
6
SCALE: hardware-oriented material
Hinjector
⭐
6
31c3
⭐
6
Patched version of MatrixSSL for timing-based Bleichenbacher attacks against TLS.
Moepdefend
⭐
6
Example monitoring/injection tool based on libmoep
Related Searches
C Kernel (12,842)
C Video Game (4,242)
C Driver (4,106)
Python C (4,069)
C Firmware (3,545)
C Arduino (3,118)
C Usb (2,589)
C Arm (2,566)
C Command Line (2,475)
C Algorithms (2,333)
101-200 of 222 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.