Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack exploitation
attack
x
exploitation
x
40 search results found
Beef
⭐
9,150
The Browser Exploitation Framework Project
Active Directory Exploitation Cheat Sheet
⭐
4,672
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Pacu
⭐
3,879
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Cdk
⭐
3,267
📦 Make security testing of K8s, Docker, and Containerd easier.
Collisions
⭐
2,661
Hash collisions and exploitations
Tinc
⭐
1,810
a VPN daemon
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Goby
⭐
1,081
Attack surface mapping
Hashpump
⭐
1,080
A tool to exploit the hash length extension attack in various hashing algorithms
Singularity
⭐
937
A DNS rebinding attack framework.
Pentesttools
⭐
816
Awesome Pentest Tools Collection
Htshells
⭐
801
Self contained htaccess shells and attacks
Tactical Exploitation
⭐
768
Modern tactical exploitation toolkit.
Deauthdetector
⭐
737
Detect deauthentication frames using an ESP8266
Powermemory
⭐
726
Exploit the credentials present in files and memory
Spectre Attack
⭐
662
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Nginx Lua Anti Ddos
⭐
649
A Anti-DDoS script to protect Nginx web servers using Lua with a HTML Javascript based authentication puzzle inspired by Cloudflare I am under attack mode an Anti-DDoS authentication page protect yourself from every attack type All Layer 7 Attacks Mitigating Historic Attacks DoS DoS Implications DDoS All Brute Force Attacks Zero day exploits Social Engineering Rainbow Tables Password Cracking Tools Password Lists Dictionary Attacks Time Delay Any Hosting Provider Any CMS or Custom Website Unlimi
Clusterd
⭐
609
application server attack toolkit
Hitcon Training
⭐
602
For Linux binary Exploitation
Ssrf_vulnerable_lab
⭐
599
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Exploit Cve 2017 7494
⭐
328
SambaCry exploit and vulnerable container (CVE-2017-7494)
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Shiva
⭐
222
An Ansible playbook to provision a host for penetration testing and CTF challenges
Reading Material
⭐
195
📚 Stuff to read up
Killchain
⭐
192
A unified console to perform the "kill chain" stages of attacks.
Csrft
⭐
173
A lightweight CSRF Toolkit for easy Proof of concept
Ctf Tool
⭐
166
A curated list of Capture The Flag (CTF) frameworks, libraries, resources and softwares.
Beehive
⭐
156
Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
Osueta
⭐
151
A simple Python script to exploit the OpenSSH User Enumeration Timing Attack.
R00kie Kr00kie
⭐
148
PoC exploit for the CVE-2019-15126 kr00k vulnerability
Pakuri
⭐
140
PAKURI has been merged with Python and launched as a new project, PAKURI-THON.
Owasp Mth3l3m3nt Framework
⭐
139
OWASP Mth3l3m3nt Framework is a penetration testing aiding tool and exploitation framework. It fosters a principle of attack the web using the web as well as pentest on the go through its responsive interface.
Vailyn
⭐
126
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Nailgun
⭐
116
Nailgun attack on ARM devices.
Flashsploit
⭐
111
Exploitation Framework for ATtiny85 Based HID Attacks
Compsecattacklabs
⭐
107
Contains Attack labs
Metasploit Autopwn
⭐
102
db_autopwn plugin of metasploit
Php Backdoors
⭐
101
PHP shell backdoors list ( collection )
Stm32f1 Picopwner
⭐
98
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 on STM32F1 chips
Ektotal
⭐
98
[BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack
Clang Cfi Bypass Techniques
⭐
90
Exploitation techniques to bypass Clang CFI when applied to Chromium
Tcp_exploit
⭐
89
Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secret
Heap_exploit_2.31
⭐
89
Slowloris
⭐
89
Asynchronous Python implementation of SlowLoris DoS attack
Damnvulnerablecryptoapp
⭐
81
An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit more about crypto, without the need to dive deep into the math behind it
Rsaexploits
⭐
72
Hardware Attacks State Of The Art
⭐
67
Microarchitectural exploitation and other hardware attacks.
Pentest Bookmarkz
⭐
67
A collection of useful links for Pentesters
Sentinel
⭐
64
Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect your programs against 0-day attacks or publicly known bugs.
Chall.stypr.com
⭐
57
Stereotyped Challenges (2014~2023)
Nixawk Awesome Windows Exploitation
⭐
55
Smotherspectre
⭐
49
Proof-of-concept code for the SMoTherSpectre exploit.
Gitctf
⭐
49
Git-based CTF
Heartbleed Poc
⭐
44
💔 Hearbleed exploit to retrieve sensitive information CVE-2014-0160 💔
Exploit Cve 2017 5715
⭐
43
Spectre exploit
Sql_injection_payload
⭐
42
SQL Injection Payload List
Forta Attack Simulation
⭐
40
🦠🔬 Forta bot that detects deployment of smart contracts containing exploit function
Languagebackdoors
⭐
38
Compiler exploits and exploitable non-obvious source code back doors.
Helepolis
⭐
35
Android based APT exploitation framework
Cve 2023 22518
⭐
35
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
Greyscript
⭐
31
Stuff for grey hack
Atat
⭐
31
Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.
Hardenedpaste
⭐
30
[Retired] Hardened Paste is a browser extension that prevents the “pastejacking” exploit.
Cve 2018 4407
⭐
29
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Cef
⭐
28
Proof-of-concept CORS exploitation tool.
Vmware_guest_auth_bypass
⭐
28
Proof of concept of VMSA-2017-0012
Ladderleak Attack Ecdsa
⭐
26
Memwars
⭐
25
Ducky_reaper
⭐
24
Collection of Multi-platform Scripts for Rubber Ducky that exploit the css webkit filter attack to crash Internet Explorer, Edge or Safari, crashing the target machine Compatibility: Windows - MacOs - Linux (Ubuntu)
Zeus_reports_len
⭐
23
Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..
Ethsploiter
⭐
22
Raspberry Pi Zero exploiting gadget using ethernet over USB
Formatstring Exploit
⭐
21
Dead simple format string exploit payload generator
Browserrecon Php
⭐
19
Advanced Web Browser Fingerprinting
Cloak And Dagger
⭐
19
An overlay attack example
Paddingoracledemos
⭐
19
Roppy
⭐
19
A Pwning Toolkit
Oambuster
⭐
19
Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)
Loki
⭐
19
The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks
Windowsexploitation
⭐
18
A curated list of awesome Windows Exploitation resources, and shiny things.
Sepm Eop
⭐
17
CVE-2018-18368 SEP Manager EoP Exploit
Rsaexploits
⭐
16
Java Web Vulnerabilities
⭐
16
Plattform to develop and experiment with existing java web attacks.
Hitcon Training Writeup
⭐
16
A brief writeup for https://github.com/scwuaptx/HITCON-Training
Teensy3.2 Projects
⭐
16
Teensy 3.2 Projects - Teensy with CMD Command Execution Attack Example 💣
Printer Hacking
⭐
15
Going through http://hacking-printers.net/
Roxysploit
⭐
14
A Hackers framework
Jboss_jmxinvokerservlet_deserialization_rce
⭐
14
Jboss_JMXInvokerServlet_Deserialization_RCE
Hover_with_power
⭐
13
This repo is dedicated to a powerpoint exploit
Bigseclist
⭐
13
A large repository of links spanning all topics in information security.
Pybleach
⭐
13
A library to facilitate the exploitation of padding oracle attacks
Beefstrike
⭐
13
Penetration testing bot for BeEF and Armitage/Cobalt Strike integration.
Attacktoolkit
⭐
13
Open-source Exploiting Framework
Ctfpwnng
⭐
12
Automation framework for attack-defense CTFs.
Buffer Overflow Exploit
⭐
11
Created a server vulnerable to Buffer Overflow using Visual Studio and perform a Stack Based and SEH Based Buffer Overflow Attack.
Metin2 Akira Metasploit
⭐
9
Hybrid client emulator (python and C++) for Metin2.
Sagittariusec
⭐
9
SEC ruleset for common exploit patterns and my master thesis
Attack Defense Ctf Demo
⭐
9
demo of an attack & defense CTF
Ssrf Playground
⭐
9
A playground to practice SSRF Attacks against web apps
Padoracle
⭐
9
Padding Oracle Attack with Node.js
Related Searches
Python Attack (2,319)
Python Exploitation (1,616)
Exploitation Cve (771)
Javascript Attack (693)
Vulnerabilities Exploitation (629)
Attack Adversarial (590)
C Exploitation (545)
Security Attack (533)
C Attack (491)
Java Attack (408)
1-40 of 40 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.