Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security attack
attack
x
security
x
281 search results found
Whitepaper
⭐
12
Interview_tips
⭐
12
Summary of Cyber Security interview questions I have been through, hope this helps
Container Security
⭐
11
Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides
Koa Protect
⭐
11
Security module for koa applications
Network Security
⭐
11
network security scripts and tips....
Attack_face_recognition
⭐
11
The implementation of AttackAI in Ali Tianchi Security Competition Phase One.
Njaxt
⭐
10
Not just another XSS tool
Awesome Side Channel Attack
⭐
10
A curated list of awesome side-channel attack resources
Node Security Checklist
⭐
10
node.js server security checklist
Sqli Detector In Python
⭐
10
python based sqli detector tool
Isdc Ng5
⭐
10
Refactoring official website of ISDC(Sichuan University Information Security and Network Attack and Defense Community)
Prevent Flash Loan Attacks
⭐
10
We are dedicated to stopping flash loan and oracle manipulation attacks. Please consider contributing if you have additional information.
Security Log
⭐
10
High performance, attack detection from web server logs.
Web Security Interview Questions
⭐
10
🟣 Web Security Interview Questions Answered to help you get ready for your next tech interview.
Security Research Membership Inference And Differential Privacy
⭐
10
SAP Security Research sample code to reproduce the research done in our paper "Comparing local and central differential privacy using membership inference attacks".
Avwa
⭐
10
Advanced Vulnerable Web Application (AVWA)
Pythia
⭐
10
Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.
Ddos2
⭐
10
Denial of service testing toolkit written in C
Vulnwebcollection
⭐
9
Web attack vectors collection
Mulval
⭐
9
MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )
Isdc Ssh
⭐
9
Refactoring official website backend of ISDC(Sichuan University Information Security and Network Attack and Defense Community)
Xanthus
⭐
9
System traces dataset generation tool.
Sheepdog
⭐
9
Pydhcpstarvator
⭐
9
DHCP starvation with Python Scapy
Rails Template Docker Compose Example 1
⭐
9
Rails Starter Template configured to Run with Docker
Mongoid Rails Template
⭐
9
This is a rails template that integrates our best practices when we develop web apps using mongoid
Xdomain Dpa M23
⭐
9
Cross-Domain DPA Attack on SAML11
Rails Template
⭐
9
simple rails template
Trellis Disable Xml Rpc
⭐
9
Disable WordPress XML RPC on Trellis sites
Symlink Secure Boot Vm
⭐
9
VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/defeating-secur
Blank Protector
⭐
9
Chrome extension that sets window.opener on every page to null to avoid phishing attacks based on target _blank vulnerability
Kirv
⭐
8
Materials for the Cryptography and computer security course
Building Intrusion Detection System
⭐
8
Building Intrusion Detection System for Network Security Using the KD99 Data Set
Sipban
⭐
8
Block unwanted registrations from SIP Scan attack using Asterisk AMI and iptables
Osint
⭐
8
Open Source Intelligence
Node Shield
⭐
8
Protects against common Node.js vulnerabilities in MEAN stack (MongoDB, Node.js).
Inventedattack
⭐
8
A POC attack combining IP SPoofing, SYN Flood and IP Fragmentation
Vulnerability Testing Solutions
⭐
8
Website for testing and preventing different attacks like XSS, SQL Injection & Spoofing for Nasscom (ISAA) Project.
Simple Guardian
⭐
8
Super easy and fast to deploy Fail2Ban alternative
Lascar
⭐
8
Mirror of lascar (https://github.com/Ledger-Donjon/lascar)
Poirot
⭐
7
Alloy for security
Securibench Micro
⭐
7
Securibench Micro is a benchmark for static analysis tools for security.
Security Guard
⭐
7
A carefully selected security suite for WordPress that combines only the most effective methods of guarding against hackers and other common attacks.
Heartbleed
⭐
7
Heartbleed vulnerability exploited 🩸
Cve
⭐
7
A collection of vulnerabilities found through independent security research.
Violent Python
⭐
7
Scripts and code example about penetration testing, web, network and exploiting wireless devices.
Probeguard
⭐
7
ProbeGuard: Mitigating Probing Attacks Through Reactive Program Transformations [ ASPLOS'19 ]
Virgil Purekit Go
⭐
7
PureKit Golang is a security framework that allows developers to protect users' passwords and sensitive personal information in a database from data breaches and both online and offline attacks and make stolen passwords useless even if a database is breached.
Secant
⭐
7
Security Cloud Assessment Tool
Demo Cloud Native Ebpf Day
⭐
7
Various eBPF programs for tracing network connections
The Andha Lab
⭐
6
The Andha Lab to practice Blind Injection Attacks in Web Application Security.
Web Security Common Vulnerabilities And Their Mitigation
⭐
6
Code Repository for Web Security: Common Vulnerabilities And Their Mitigation, published by Packt
Wishtack Websheep
⭐
6
⛔️deprecated and replaced by https://github.com/marmicode/websheep
Arpandroid
⭐
6
Android tool based on arp security!
Trellis Cve 2018 6389
⭐
6
Mitigate CVE-2018-6389 WordPress load-scripts / load-styles attacks
Webhacking
⭐
6
Blockchain Security Awesome
⭐
6
区块链安全专题智库
Ssl
⭐
6
Rules that relate to checking the SSL configuration of each individual resolved server from the domain to ensure locked down config with the broadest compatibility
Wpscrack
⭐
6
wpscrack, the first wps brute force tool
Ictm
⭐
6
A user-first approach to threat modeling.
Fosdem 2015
⭐
6
FOSDEM 2015 Security Devroom organization and information
Phishing Demo
⭐
6
Demonstration of wifi sniffing, dns poisoning, mitm and phishing attack
Security Papers
⭐
5
Security papers about software vulnerabilities and exploits
Safeware Benchmark
⭐
5
SAFEWARE Program Obfuscation Benchmark
Virgil Purekit Php
⭐
5
PureKit PHP SDK allows developers to protect users' passwords and sensitive personal information in a database from data breaches and both online and offline attacks and make stolen passwords useless even if a database is breached.
Xsscan
⭐
5
A simple script to detect unescaped characters in a web application for e.g. Cross Site Scripting (XSS) attacks.
Deep Learning Security Basic For Kisa
⭐
5
Prtbruteforce
⭐
5
Bruteforce library that allows you to implement bruteforce in any application at ease.
Zaproxy
⭐
5
Websitesforhackers
⭐
5
Collection of Websites for Hackers
Simple Guardian Web
⭐
5
Web UI for the Simple Guardian
Shielded
⭐
5
Informationsecurity
⭐
5
App security is one of my key aspect of any application. In last few years my focus on security is gone up. Tons of learning and exciting experiments.
Cve 2020 0022
⭐
5
A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)
Pixel Discretization
⭐
5
Pixel discretization defense against adversarial attacks
Exploitstudy
⭐
5
Ecto_row_level_security
⭐
5
Demonstration of postgres row level security policies using Elixir/Ecto
Attackmate
⭐
5
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
Security
⭐
5
Exploiting/exploring security vulnerabilities
Security Resources
⭐
5
Archive of Security Resources - Trainings, meetups, Links
Securityrampup
⭐
5
Curated list of content to learn and practice some of the skills and knowledge required for Information Security
Pep On Pypi With Tuf
⭐
5
PEP 458: Securing the Link from PyPI to the End User
Network Security
⭐
5
CS6740 Spring 2016 Network Security Class Codes
Java Secure App
⭐
5
Cryptoran
⭐
5
A crypto library implementing pkc, block ciphers, key exchange and signatures
Webapp Hacking
⭐
5
Collection of resources to learn and practice WebApp attacks.
Related Searches
Security Vulnerabilities (12,295)
Laravel Security (11,580)
Php Security (10,611)
Javascript Security (2,969)
Html Security (2,284)
Python Attack (2,266)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
201-281 of 281 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.