Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attacker
attacker
x
567 search results found
Awesome Honeypots
⭐
7,643
an awesome list of honeypot resources
Maltrail
⭐
5,572
Malicious traffic detection system
Cowrie
⭐
4,889
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Sql Injection Payload List
⭐
3,966
🎯 SQL Injection Payload List
Blocklist Ipsets
⭐
2,813
ipsets dynamically updated with firehol's update-ipsets.sh script
Cloudgoat
⭐
2,330
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Devalue
⭐
1,866
Gets the job done when JSON.stringify can't
Slipstream
⭐
1,764
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
Piracychecker
⭐
1,545
An Android library that prevents your app from being pirated / cracked using Google Play Licensing (LVL), APK signature protection and more. API 14+ required.
Inception
⭐
1,539
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
Kippo
⭐
1,529
Kippo - SSH Honeypot
Facebook Bruteforce
⭐
1,396
Bruteforce attack on Facebook account using python script
Platypus
⭐
1,372
🔨 A modern multiple reverse shell sessions manager written in go
Secure Ios App Dev
⭐
1,338
Collection of the most common vulnerabilities found in iOS applications
Nym
⭐
1,195
Nym provides strong network-level privacy against sophisticated end-to-end attackers, and anonymous transactions using blinded, re-randomizable, decentralized credentials.
Understanding Csrf
⭐
1,006
What are CSRF tokens and how do they work?
Labs
⭐
939
Vulnerability Labs for security analysis
Portspoof
⭐
916
Portspoof
Secure_rails
⭐
903
Rails security best practices
Mitigating Web Shells
⭐
895
Guidance for mitigation web shells. #nsacyber
Python Ecdsa
⭐
874
pure-python ECDSA signature/verification and ECDH key agreement
Phpauth
⭐
867
PHPAuth is a secure PHP Authentication class that easily integrates into any site.
Hash_extender
⭐
862
Xxe Injection Payload List
⭐
825
🎯 XML External Entity (XXE) Injection Payload List
Password Hashing
⭐
820
Password hashing code.
Takeover
⭐
816
Sub-Domain TakeOver Vulnerability Scanner
Skyark
⭐
725
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
Corscanner
⭐
701
Fast CORS misconfiguration vulnerabilities scanner🍻
Phpids
⭐
676
PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application
Grapl
⭐
671
Graph platform for Detection and Response
K8s Security
⭐
659
Kubernetes security notes and best practices
Evilfoca
⭐
596
Tool to analyze and test security in IPv4 and IPv6 data networks
Gadgetinspector
⭐
568
A byte code analyzer for finding deserialization gadget chains in Java applications
Hacking
⭐
515
hacker, ready for more of our story ! 🚀
Imagenet Adversarial Training
⭐
510
ImageNet classifier with state-of-the-art adversarial robustness
Siem
⭐
489
SIEM Tactics, Techiques, and Procedures
Xsschef
⭐
486
Chrome extension Exploitation Framework
Meterssh
⭐
476
MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relay
Bigbountyrecon
⭐
471
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Ssti Payloads
⭐
465
🎯 Server Side Template Injection Payloads
Cve 2017 11882
⭐
464
Proof-of-Concept exploits for CVE-2017-11882
Dns Rebind Toolkit
⭐
447
A front-end JavaScript toolkit for creating DNS rebinding attacks.
Instabrute
⭐
429
InstaBrute Two Ways to Brute-force Instagram Account Hacking
Ovaa
⭐
416
Oversecured Vulnerable Android App
Subaru Starlink Research
⭐
405
Subaru StarLink persistent root code execution.
Python Ransomware
⭐
403
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Decoymini
⭐
390
🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Impulse
⭐
379
💣 Impulse Denial-of-service ToolKit
Defusedxml
⭐
367
Shadowd
⭐
361
Secure login distribution service
Printbf
⭐
357
Brainfuck interpreter inside printf
Honssh
⭐
350
HonSSH is designed to log all SSH communications between a client and server.
Lostpass
⭐
336
Pixel-perfect LastPass phishing
Shadowsocks
⭐
330
Redirect attack on Shadowsocks stream ciphers
Speculation Bugs
⭐
318
Docs and resources on CPU Speculative Execution bugs
Polypasswordhasher
⭐
316
A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.
Prism
⭐
295
PRISM is an user space stealth reverse shell backdoor, written in pure C.
Daily Info
⭐
280
Ruby Mmo
⭐
275
Ruby MMO: massively multiplayer online programming challenge
Aggr Inject
⭐
268
Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.
Betterbackdoor
⭐
262
A backdoor with a multitude of features.
Credsleaker
⭐
251
Credsleaker allows an attacker to craft a highly convincing credentials prompt using Windows Security, validate it against the DC and in turn leak it via an HTTP request.
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Armor
⭐
238
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Call For Wpa3
⭐
231
Call for WPA3 - what's wrong with WPA2 security and how to fix it
Nac_bypass
⭐
220
Script collection to bypass Network Access Control (NAC, 802.1x)
Poodle Poc
⭐
211
🐩 Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 🐩
Spectre Attack Sgx
⭐
203
Spectre attack against SGX enclave
Toolanalysisresultsheet
⭐
201
Tool Analysis Result Sheet
Libtech Auditing Cheatsheet
⭐
194
Networm
⭐
186
Python network worm that spreads on the local network and gives the attacker control of these machines.
Dotnet Licence Key Generator
⭐
184
Key Generation and Verification System component .NET Core 1.0+, .NET Framework 4.5+
Mysql Unsha1
⭐
174
Authenticate against a MySQL server without knowing the cleartext password
Pentesting Playground
⭐
172
Code for installing various security minded tools onto Vagrant powered virtual machines
Jira Scan
⭐
170
CVE-2017-9506 - SSRF
Arp Spoofer
⭐
169
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Psbypassclm
⭐
166
Bypass for PowerShell Constrained Language Mode
Honeypi
⭐
158
Remote Desktop Caching
⭐
155
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Insecure Firebase Exploit
⭐
154
A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase db.
Leaky Leaky
⭐
152
[PATCHED] Exploit that allows one to authenticate as any user in Minecraft
Sshhipot
⭐
151
High-interaction MitM SSH honeypot
Shelljack
⭐
147
A keystroke / terminal logger for Linux.
Mosquito
⭐
143
XSS exploitation tool - access victims through HTTP proxy
Elastichoney
⭐
143
A Simple Elasticsearch Honeypot
Qubes Antievilmaid
⭐
133
Qubes component: antievilmaid
Dockerpot
⭐
133
A docker based honeypot.
Konscious.security.cryptography
⭐
131
Linux Luks Tpm Boot
⭐
126
A guide for setting up LUKS boot with a key from TPM in Linux
Sharpexchangepriv
⭐
124
A C# implementation of PrivExchange by @_dirkjan.
Byp Sop
⭐
122
🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️
Tpmgenie
⭐
120
TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules
Lovely Potato
⭐
118
Automating juicy potato local privilege escalation exploit for penetration testers.
Easy Encryption
⭐
116
A very simple C++ module to encrypt/decrypt strings based on B64 and Vigenere ciper.
Cbcrypt
⭐
116
Next-generation bcrypt, scrypt, pbkdf2
Bigipsecurity
⭐
115
This document describes common misconfigurations of F5 Networks BigIP systems.
Rememberme
⭐
115
A PHP library that implements secure "Remember me" cookies
Cve 2018 13382
⭐
114
CVE-2018-13382
Html Vault
⭐
114
Generates self-contained HTML files protecting secret text content.
War_of_the_five_kings_dataset
⭐
113
A dataset of the battles in the War of the Five Kings from George R.R. Martin's A Song Of Ice And Fire series.
Related Searches
Python Attacker (365)
Attack Attacker (278)
1-100 of 567 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.