Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security attack
attack
x
security
x
281 search results found
Api Security Checklist
⭐
21,626
Checklist of the most important security countermeasures when designing, testing, and releasing your API
Bettercap
⭐
15,224
The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
Wifiphisher
⭐
12,656
The Rogue Access Point Framework
Beef
⭐
9,150
The Browser Exploitation Framework Project
Fuzzdb
⭐
7,703
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
Awesome Web Hacking
⭐
5,260
A list of web application security
Active Directory Exploitation Cheat Sheet
⭐
4,672
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
W3af
⭐
4,142
w3af: web application attack and audit framework, the open source web vulnerability scanner.
Pacu
⭐
3,879
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Openrasp
⭐
2,638
🔥Open source RASP solution
Attacksurfaceanalyzer
⭐
2,616
Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.
Textattack
⭐
2,597
TextAttack 🐙 is a Python framework for adversarial attacks, data augmentation, and model training in NLP https://textattack.readthedocs.io/en/master/
Chainsaw
⭐
2,519
Rapidly Search and Hunt through Windows Forensic Artefacts
Apt_report
⭐
2,078
Interesting APT Report Collection And Some Special IOC
Tinc
⭐
1,810
a VPN daemon
Hayabusa
⭐
1,800
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Ddos Ripper
⭐
1,773
DDos Ripper a Distributable Denied-of-Service (DDOS) attack server that cuts off targets or surrounding infrastructure in a flood of Internet traffic
Wifipumpkin3
⭐
1,653
Powerful framework for rogue access point attack.
Zen Rails Security Checklist
⭐
1,632
Checklist of security precautions for Ruby on Rails applications.
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Awesome Crypto Papers
⭐
1,518
A curated list of cryptography papers, articles, tutorials and howtos.
Pentest Book
⭐
1,371
Awesome Iot Hacks
⭐
1,208
A Collection of Hacks in IoT Space so that we can address them (hopefully).
Intrigue Core
⭐
1,205
Discover Your Attack Surface!
Nosurf
⭐
1,081
CSRF protection middleware for Go.
Goby
⭐
1,081
Attack surface mapping
My Infosec Awesome
⭐
983
My curated list of awesome links, resources and tools on infosec related topics
Breaking And Pwning Apps And Servers Aws Azure Training
⭐
885
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
Htshells
⭐
801
Self contained htaccess shells and attacks
Graph Adversarial Learning Literature
⭐
772
A curated list of adversarial attacks and defenses papers on graph-structured data.
Awesome Cybersecurity Datasets
⭐
765
A curated list of amazingly awesome Cybersecurity datasets
Remote Method Guesser
⭐
746
Java RMI Vulnerability Scanner
Noscript
⭐
742
The popular NoScript Security Suite browser extension.
Jwt Hack
⭐
694
🔩 jwt-hack is tool for hacking / security testing to JWT. Supported for En/decoding JWT, Generate payload for JWT attack and very fast cracking(dict/brutefoce)
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Nginx Lua Anti Ddos
⭐
649
A Anti-DDoS script to protect Nginx web servers using Lua with a HTML Javascript based authentication puzzle inspired by Cloudflare I am under attack mode an Anti-DDoS authentication page protect yourself from every attack type All Layer 7 Attacks Mitigating Historic Attacks DoS DoS Implications DDoS All Brute Force Attacks Zero day exploits Social Engineering Rainbow Tables Password Cracking Tools Password Lists Dictionary Attacks Time Delay Any Hosting Provider Any CMS or Custom Website Unlimi
Hacking
⭐
515
hacker, ready for more of our story ! 🚀
Gofetch
⭐
507
GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.
Wbruter
⭐
497
wbruter was the first tool wich has been released as open source wich can guarantee 100% that your pin code will be cracked aslong as usb debugging has been enable. wbruter also includes some other brute methods like dictionary attacks for gmail, ftp, rar, zip and some other file extensions.
Raven Storm
⭐
475
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Ssti Payloads
⭐
465
🎯 Server Side Template Injection Payloads
Hackertarget
⭐
422
🎯 HackerTarget ToolKit - Tools And Network Intelligence To Help Organizations With Attack Surface Discovery 🎯
Protect
⭐
390
Proactively protect your Node.js web services
Papers
⭐
334
Academic papers and articles that I read related to web hacking, fuzzing, etc. / 阅读过的Web安全方向、模糊测试方向的一些论文与阅读笔记
Airgap Vault
⭐
332
The AirGap Vault is installed on a spare smartphone that has no connection to any network, thus it is air gapped. This app handles the private key.
Useful_websites_for_pentester
⭐
324
This repository is to make life of the pentester easy as it is a collection of the websites that can be used by pentesters for day to day studies and to remain updated.
Awesome Sgx Open Source
⭐
295
A curated list of open-source projects that help exploit Intel SGX technology
Wifi Penetration Testing Cheat Sheet
⭐
277
Work in progress...
Antiddos System
⭐
276
🛡️⚔️ Protect your web app from DDOS attack or the Dead Ping + CAPTCHA VERIFICATION in one line!
Awesome Rtc Hacking
⭐
252
a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE
Adversarial Explainable Ai
⭐
235
💡 Adversarial attacks on explanations and how to defend them
Backdoors101
⭐
231
Backdoors Framework for Deep Learning and Federated Learning. A light-weight tool to conduct your research on backdoors.
Ble Security Attack Defence
⭐
224
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Shiva
⭐
222
An Ansible playbook to provision a host for penetration testing and CTF challenges
Sas Top 10
⭐
213
Serverless Architectures Security Top 10 Guide
Attacks On Tor
⭐
202
Thirteen Years of Tor Attacks
Camerattack
⭐
201
An attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Mrkaplan
⭐
200
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
Host Validation
⭐
187
Express.js middleware for "Host" and "Referer" header validation to protect against DNS rebinding attacks.
Lorg
⭐
173
Apache Logfile Security Analyzer
Deep Spying
⭐
173
Spying using Smartwatch and Deep Learning
Cs253.stanford.edu
⭐
171
CS 253 Web Security course at Stanford University
Dheater
⭐
168
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)
Secml_malware
⭐
168
Create adversarial attacks against machine learning Windows malware detectors
Http Desync Guardian
⭐
167
Analyze HTTP requests to minimize risks of HTTP Desync attacks (precursor for HTTP request smuggling/splitting).
Pywsus
⭐
166
Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.
Beehive
⭐
156
Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
Go Agent
⭐
154
Sqreen's Application Security Management for the Go language
From Scratch
⭐
144
A hands-on walkthrough for creating an extremely insecure Kubernetes cluster and then hardening it, step by step.
Subterfuge
⭐
143
Framework for Man-In-The-Middle attacks
Kali Linux Tools Interface
⭐
141
Graphical Web interface developed to facilitate the use of security information tools.
Androidtampering
⭐
141
Android library to protect your applications against tampering attacks.
Redteam Hardware Toolkit
⭐
140
🔺 Red Team Hardware Toolkit 🔺
Knob
⭐
140
Key Negotiation Of Bluetooth (KNOB) attacks on Bluetooth BR/EDR and BLE [CVE-2019-9506]
Routopsy
⭐
135
Centry
⭐
135
Panic button for protection against cold boot attacks
Peniot
⭐
135
PENIOT: Penetration Testing Tool for IoT
Vaporsecurityheaders
⭐
133
Harden Your Security Headers For Vapor
Blankshield
⭐
133
Prevent reverse tabnabbing phishing attacks caused by _blank
Open Redirect Payload List
⭐
132
🎯 Open Redirect Payload List
Jwtxploiter
⭐
130
A tool to test security of json web token
Vailyn
⭐
126
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Serverless Top 10 Project
⭐
122
OWASP Serverless Top 10
Tpmgenie
⭐
120
TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules
Nailgun
⭐
116
Nailgun attack on ARM devices.
Awesome Ddos Tools
⭐
115
Collection of several DDos tools.
Awesome Deception
⭐
114
An awesome list of resources on deception-based security with honeypots and honeytokens
Hashpass
⭐
113
A simple password manager with a twist.
Waf4wordpress
⭐
112
WAF for WordPress 🔥 with 60+ security checks and weekly updates
List Of Web Application Security
⭐
107
List of web application security
Node Fast Ratelimit
⭐
105
☔ Fast and efficient in-memory rate-limit for Node, used to alleviate most common DOS attacks.
Tls Redirection
⭐
102
TLS Redirection
Wildpwn
⭐
99
unix wildcard attacks
Slowloris
⭐
89
Asynchronous Python implementation of SlowLoris DoS attack
Awesome Httprequestsmuggling
⭐
85
A curated list of awesome blogs and tools about HTTP request smuggling attacks. Feel free to contribute! 🍻
Antiddos
⭐
80
A very simple script that uses special iptables rules and sysctl tweaks that protects your server(s) against many different network attacks.
Awesome Wifi Security
⭐
79
A collection of awesome resources related to 802.11 security, tools and other things
Phishing Website Detection
⭐
78
It is a project of detecting phishing websites which are main cause of cyber security attacks. It is done using Machine learning with Python
Rdpmon
⭐
78
Server-side RDP Monitoring Tool
Http Protection
⭐
72
This library protects against typical web attacks. It was inspired in rack-protection Ruby gem.
Related Searches
Security Vulnerabilities (12,295)
Laravel Security (11,580)
Php Security (10,611)
Javascript Security (2,969)
Html Security (2,284)
Python Attack (2,266)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
1-100 of 281 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.