Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security attack
attack
x
security
x
281 search results found
Http Protection
⭐
72
This library protects against typical web attacks. It was inspired in rack-protection Ruby gem.
Software Security Paper List
⭐
71
Pentest Bookmarkz
⭐
67
A collection of useful links for Pentesters
Radio Hackbox
⭐
67
PoC tool to demonstrate vulnerabilities in wireless input devices
Bias
⭐
66
Bluetooth Impersonation AttackS (BIAS) [CVE 2020-10135]
Jpeg Defense
⭐
65
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Secacademic
⭐
64
记录我的安全学术学习
Logingatebundle
⭐
58
Chall.stypr.com
⭐
57
Stereotyped Challenges (2014~2023)
Strong Lumen
⭐
54
A Security-Centric Lumen Starter Kit
Rfd Checker
⭐
53
RFD Checker - security CLI tool to test Reflected File Download issues
Phaser
⭐
53
Automated attack surface mapper and vulnerability scanner (Work In Progress 🚧)
Cfautouam
⭐
53
Automatically enables CloudFlare Under Attack Mode - Bash Script
Android Clipboard Security
⭐
53
A project demonstrating a security hole In Android's API that allows any installed application to listen to changes to the clipboard (listen to everything that you copy and paste).
Wordpress Saml
⭐
52
OneLogin SAML plugin for Wordpress
Attack Surface Detector Burp
⭐
50
The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Kaiser
⭐
50
Fileless persistence, attacks and anti-forensic capabilties.
Xssmap
⭐
49
Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Ska
⭐
49
Simple Karma Attack
Node Security
⭐
47
Slides/Notes from my talk on Security Best Practices with Node.js https://www.youtube.com/watch?v=qBLgykeA3Mo
Checkurl
⭐
46
Detect evil urls that uses IDN Homograph Attack.
Typhooncon2019
⭐
43
TyphoonCon 2019
Omsp
⭐
42
Open Mobility Security Project is an open source project dedicated to standardize a framework of technical controls to evaluate security in all types of vehicles.
Awesome Tls Hacks
⭐
42
A collection of SSL/TLS security related resources.
Gatsby Plugin Csp
⭐
40
A Gatsby plugin which adds strict Content Security Policy to your project.
Linux Security Papers
⭐
40
Research paper collection for Linux kernel security from top security conferences.
Quijote
⭐
39
Quijote is an highly configurable HTTP middleware for API security.
Jmxploit
⭐
39
A tool to analyse JMX API security level.
Bsidessf 2020 Workshop
⭐
39
Materials for a live workshop at BSidesSF on deployment-level Kubernetes security controls
Topera
⭐
39
IPv6 analysis tool: the other side
Linux Rootkits Red Blue Teams
⭐
37
Linux Rootkits (4.x Kernel)
Maloss
⭐
37
Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages
Hackable
⭐
37
A python flask app that is purposefully vulnerable to SQL injection and XSS attacks. To be used for demonstrating attacks
Torshammer
⭐
36
A DOS Attack Tool
Daedalus
⭐
36
Exploring various defensive response options for effectively securing a 5G core-network
Pypuf
⭐
36
Cryptanalysis of Physically Unclonable Functions
Awesome Tls Security
⭐
35
A collection of (not-so, yet) awesome resources related to TLS, PKI and related stuff
Attack Surface Detector Zap
⭐
35
The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Awesome Security Articles
⭐
34
This repository contains links to awesome security articles.
Athena
⭐
34
Athena: A Framework for Defending Machine Learning Systems Against Adversarial Attacks
Onesie Life
⭐
34
🔓 Onesie.life is a fictional social media network that has intentional vulnerabilities
Safecontentresolver
⭐
32
A replacement for Android's ContentResolver that protects against the Surreptitious Sharing attack
Opensvp
⭐
30
Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.
Hardenedpaste
⭐
30
[Retired] Hardened Paste is a browser extension that prevents the “pastejacking” exploit.
Mitm
⭐
30
Man in the middle tool
Cve 2018 4407
⭐
29
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Constantinople Reentrancy
⭐
28
Vulnerable code example including tests for Constantinople Reentrancy
Sgx101 Gitbook
⭐
28
Synced with SGX101 gitbook.
Ratched
⭐
28
Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing
Csv Safe
⭐
28
Decorate the ruby CSV library to sanitize output CSV against CSV injection attacks.
Input Aware Backdoor Attack Release
⭐
27
Input-aware Dynamic Backdoor Attack (NeurIPS 2020)
Wpcracker
⭐
27
WordPress pentest tool
Pen Test Automation
⭐
26
A framework for automating penetration testing using a plugin based architecture
Amlsec
⭐
26
Automated Security Risk Identification Using AutomationML-based Engineering Data
Xss Cheatsheet
⭐
25
XSS Cheatsheet - A collection of XSS attack vectors https://xss.devwerks.net/
Attack_range_cloud
⭐
24
Attack Range to test detection against nativel serverless cloud services and environments
Provenance Papers
⭐
24
Litewaf
⭐
24
Lightweight In-App Web Application Firewall for PHP
Hoodiecrow
⭐
23
Mail App with integrated OpenPGP encryption
6.858 Lecture Notes
⭐
23
6.858 Computer Systems Security: Lecture notes (edited a little and formatted with Markdown)
Malware
⭐
22
IoT Security Reading List
Mqttsa
⭐
21
A tool to assist IoT developers in securing MQTT-based IoT deployments
Assap
⭐
21
Anti Shoulder Surfing Attack Platform (ASSAP)
Springsecurity Jwt Vue Deom
⭐
20
A demonstration of stateless JWT authentication with Spring Security, Spring Boot and Vue js
Zesecurity
⭐
19
A ZF2 module that adds an out of the box security layer for your applications based on PHPIDS.
Cloak And Dagger
⭐
19
An overlay attack example
Ruby Homograph Detector
⭐
19
🕵️♀️🕵️♂️ Ruby gem for determining whether a given URL is considered an IDN homograph attack
Transparent Security
⭐
19
Transparent Security is a solution for identify the source devices of a DDoS attack and mitigates the attack in the customer premises or the access network. This solution leverages a P4 based programmable data plane for add in-band network telemetry (INT) for device identification and in-band mitigation.
Attack Review Testbed
⭐
18
Make it easy to probe the strengths and weaknesses of a hardened Node.js stack
Icestick Lpc Tpm Sniffer
⭐
18
FGBA-based LPC bus sniffing tool for Lattice iCEstick Evaluation Kit
Rails Template Docker Kubernetes
⭐
18
Bwapp Code
⭐
18
clone of http://sourceforge.net/projects/bwapp/
Computersecurityattacks
⭐
18
Contains SEED Labs solutions from Computer Security course by Kevin Du.
Solidity Audit Checklist
⭐
18
A checklist of things to look for when auditing Solidity smart contracts.
Ddos
⭐
17
Simple dos attack utility
Cerberus
⭐
17
Cerberus is another simple stressing tool simulating DDoS attacks.
Ppp Ccs2018
⭐
17
An investigative study on the security and privacy aspects of Progressive Web Apps
Seedlab
⭐
17
Records & Reports for Seed-project
Awesome Application Security Checklist
⭐
16
Checklist of the most important security countermeasures when designing, creating, testing your web/mobile application
Ssrf Req Filter
⭐
16
Module to prevent SSRF when sending requests in NodeJS. Blocks request to local and private IP addresses
Solidity Truffle Tests
⭐
16
A series of attack tests on commonly used libraries and contracts in the ethereum web space
Teensy3.2 Projects
⭐
16
Teensy 3.2 Projects - Teensy with CMD Command Execution Attack Example 💣
Flask Xsrf
⭐
15
flask extension for defending against cross-site request forgery attacks (XSRF/CSRF)
Wfes
⭐
15
A framework for evaluating Website Fingerprinting attacks/defences, accompaining the paper "Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses" (Cherubin, 2017)
Dn Institute
⭐
15
Distributed Networks Institute
Blockchain Security Awesome
⭐
15
Noble Ripemd160
⭐
15
Noble RIPEMD160. High-security, easily auditable, 0-dep, 1-file hash function
Rloris
⭐
15
A Rust implementation of slow HTTP DoS techniques
Rdpinception
⭐
15
A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.
Shareattack
⭐
14
Automatically attack all file shares within AD network environment. Exploiting weak permissions.
Cs259d_notes_hw
⭐
14
The notes are the supplement to papers and handouts of CS 259D
Laminas Xml
⭐
14
Utility library for XML usage, best practices, and security in PHP
Thermometerencoding
⭐
13
reproduction of Thermometer Encoding: One Hot Way To Resist Adversarial Examples in pytorch
Bigseclist
⭐
13
A large repository of links spanning all topics in information security.
Eagleeye
⭐
13
EagleEye DDoS Tool version 2.1
Webapp Tech
⭐
13
Aaspe
⭐
12
A set of modeling tools for security analysis (attack tree, attack impact) and a code generator to produce code for the seL4 platform from AADL models.
Futuretrust
⭐
12
FutureTrust analyzes electronic identification (eID) services in Europe and beyond. It is funded within the EU Framework Programme for Research and Innovation (Horizon 2020).
Comptia Security Sy0 501 Study Guide
⭐
12
Study Guide for CompTIA Security+ SY0 501 exam
Security Malware Firewall
⭐
12
Security & Malware scan by CleanTalk
Related Searches
Security Vulnerabilities (12,295)
Laravel Security (11,580)
Php Security (10,611)
Javascript Security (2,969)
Html Security (2,284)
Python Attack (2,266)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
101-200 of 281 search results
< Previous
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.