Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python attacker
attacker
x
python
x
234 search results found
Awesome Honeypots
⭐
6,871
an awesome list of honeypot resources
Maltrail
⭐
5,124
Malicious traffic detection system
Cowrie
⭐
4,290
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Cloudgoat
⭐
2,047
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Inception
⭐
1,480
Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.
Kippo
⭐
1,279
Kippo - SSH Honeypot
Facebook Bruteforce
⭐
1,229
Bruteforce attack on Facebook account using python script
Labs
⭐
939
Vulnerability Labs for security analysis
Takeover
⭐
816
Sub-Domain TakeOver Vulnerability Scanner
Corscanner
⭐
701
Fast CORS misconfiguration vulnerabilities scanner🍻
Imagenet Adversarial Training
⭐
510
ImageNet classifier with state-of-the-art adversarial robustness
Hacking
⭐
491
hacker, ready for more of our story ! 🚀
Meterssh
⭐
476
MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communications as a normal SSH connection. The way it works is by injecting shellcode into memory, then wrapping a port spawned (meterpeter in this case) by the shellcode over SSH back to the attackers machine. Then connecting with meterpreter's listener to localhost will communicate through the SSH proxy, to the victim through the SSH tunnel. All communications are relay
Cve 2017 11882
⭐
464
Proof-of-Concept exploits for CVE-2017-11882
Python Ransomware
⭐
403
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles
Impulse
⭐
379
💣 Impulse Denial-of-service ToolKit
Honssh
⭐
350
HonSSH is designed to log all SSH communications between a client and server.
Lascar
⭐
338
Ledger's Advanced Side-Channel Analysis Repository
Shadowsocks
⭐
330
Redirect attack on Shadowsocks stream ciphers
Defusedxml
⭐
309
Aggr Inject
⭐
268
Remote frame injection PoC by exploiting a standard compliant A-MPDU aggregation vulnerability in 802.11n networks.
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Poodle Poc
⭐
211
🐩 Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 🐩
Libtech Auditing Cheatsheet
⭐
194
Networm
⭐
186
Python network worm that spreads on the local network and gives the attacker control of these machines.
Jira Scan
⭐
170
CVE-2017-9506 - SSRF
Arp Spoofer
⭐
169
A pure-Python ARP Cache Poisoning (a.k.a "ARP Spoofing") tool
Remote Desktop Caching
⭐
155
This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team member to extract juicy information such as LAPS passwords or any sensitive information on the screen. Blue Team member can reconstruct PNG files to see what an attacker did on a compromised host. It is extremely useful for a forensics team to extract timestamps after an attack on a host to collect evidences and perform further analysis.
Insecure Firebase Exploit
⭐
154
A simple Python Exploit to Write Data to Insecure/vulnerable firebase databases! Commonly found inside Mobile Apps. If the owner of the app have set the security rules as true for both "read" & "write" an attacker can probably dump database and write his own data to firebase db.
Cve 2018 13382
⭐
114
CVE-2018-13382
Html Vault
⭐
114
Generates self-contained HTML files protecting secret text content.
Cve 2019 0708
⭐
110
Only Hitting PoC [Tested on Windows Server 2008 r2]
Defplorex
⭐
103
defplorex for BlackHat Arsenal
Snopf
⭐
102
snopf USB password token
Apache Superset Remote Code Execution Poc Cve 2018 8021
⭐
102
CVE-2018-8021 Proof-Of-Concept and Exploit
Cve Flow
⭐
100
CVE Data Analysis, CVE Monitor, CVE EXP Prediction Based on Deep Learning. 1999-2020年存量CVE数据分析、监控CVE增量更新、基于深度学习的CVE EXP预测和自动化推送
Jiraffe
⭐
98
One stop place for exploiting Jira instances in your proximity
Django_cve_2019_19844_poc
⭐
92
PoC for CVE-2019-19844(https://www.djangoproject.com/weblo
Py Seccure
⭐
89
SECCURE compatible Elliptic Curve cryptography in Python
Social_attacker
⭐
89
An Open Source Multi Site Automated Social Media Phishing Framework
Mmdetect
⭐
85
Intel ME Manufacturing Mode Detection Tools
Mia
⭐
81
A library for running membership inference attacks against ML models
Poodle
⭐
74
A Proof of Concept for the POODLE vulnerability in SSLv3
Open Mtg
⭐
72
A python implementation of Magic: The Gathering with an AI that plays it using Monte Carlo move evaluation.
Cve 2019 8449
⭐
60
CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4
Lucid Ddos
⭐
56
A Practical, Lightweight Deep Learning Solution for DDoS Attack Detection
Robgan
⭐
51
Rob-GAN: Generator, Discriminator and Adversarial Attacker
Oncogene
⭐
50
A simple Windows and Linux RAT/Backdoor + Keylogger written in Python3 using sockets
Python Spake2
⭐
50
pure-python implementation of the SPAKE2 Password-Authenticated Key Exchange algorithm
Bluebox
⭐
50
Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049
Exploits
⭐
49
Real world and CTFs exploiting web/binary POCs.
Attacker Group Predictor
⭐
48
Tool to predict attacker groups from the techniques and software used
Horsephrase
⭐
48
Secure Password Generator
Ctfsubmitter
⭐
48
A flag submitter service with distributed attackers for attack/defense CTF games.
Cloudcopy
⭐
46
This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapshot permission.
Django Argonauts
⭐
46
DEPRECATED: A lightweight collection of JSON helpers for Django.
Minerinthemiddle
⭐
44
Beast Poc
⭐
40
💪 Proof Of Concept of the BEAST attack against SSL/TLS CVE-2011-3389 💪
Krack
⭐
39
Spoofspotter
⭐
38
A tool to catch spoofed NBNS responses.
Nrp
⭐
37
Official repository for "A Self-supervised Approach for Adversarial Robustness" (CVPR 2020--Oral)
Return To Abort
⭐
37
return-to-abort() - Using code introspection to prevent stack-smashing
Dumpit
⭐
36
An exploit for SHAREit <= v 4.0.38
Dir8xx_poc
⭐
35
Proof-of-Concept exploits for D-Link DIR8xx routers
Chosen Plaintext
⭐
35
A small python library for exploiting simple chosen-plaintext attacks.
Dockpot
⭐
33
Webtrap
⭐
33
This project is designed to create deceptive webpages to deceive and redirect attackers away from real websites.
Wd Rce
⭐
31
WD My Cloud PoC exploit
Opensvp
⭐
30
Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.
Rsb Framework
⭐
30
Windows/Linux - ReverseShellBackdoor Framework
Brutus
⭐
30
Botnet targeting Windows machines written entirely in Python & open source security project.
Evil Jar
⭐
30
evil jar attack technical post-mortem
Cve 2020 15906
⭐
27
Writeup of CVE-2020-15906
Poc Cve 2018 0114
⭐
25
This repository contains the POC of an exploit for node-jose < 0.11.0
Burn Byte
⭐
25
Burn Byte is a modern and powerful DDOS Toolkit
Piuser
⭐
25
👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡
Simple Dns
⭐
24
A simple regular-expression based DNS server
Blindref
⭐
24
BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework
Caa
⭐
24
The implementation of the paper [Composite Adversarial Attacks](https://arxiv.org/abs/2012.05434) in AAAI2021
Cve 2017 8295
⭐
23
Cookiejack
⭐
23
ARP spoof then session jack within your browser
Adversarylosslandscape
⭐
22
On the Loss Landscape of Adversarial Training: Identifying Challenges and How to Overcome Them [NeurIPS 2020]
Asus Smarthome Exploit
⭐
22
ASUS SmartHome Exploit for CVE-2019-11061 and CVE-2019-11063
Brute Force Password Cracker
⭐
21
A brute force attacker with packages for development in Python 3, Kotlin, C#, Go, and C++.
Qubes App Linux Split Gpg
⭐
21
Qubes component: app-linux-split-gpg
Cve 2020 1958
⭐
21
CVE-2020-1958 PoC
Brightid Antisybil
⭐
21
Sybil detection package for BrightID
2020 Machine Learning Security Evasion Competition
⭐
21
2020 Machine Learning Security Evasion Competition
Nocrack
⭐
20
A new kind of password vault that fools the brute-force attacker by charning out decoy passwords.
Cve 2019 0708
⭐
20
CVE-2019-0708
Lockwatcher
⭐
20
Anti-forensic monitor program: watches for signs of tampering and purges keys/shuts everything down.
Pythonadvancedhttpreverseshell
⭐
19
Advanced python HTTP reverse shell made for Hacking Competition purpose. I am not responsible of what you do with this tool.
Crossdomainscanner
⭐
17
Python tool for expired domain discovery in crossdomain.xml files
Honeywrt
⭐
17
Crime Poc
⭐
16
🔪 CRIME attack PoC : a compression oracle attacks CVE-2012-4929 🔪
Qrljacking
⭐
16
Tool For Termux and Linux Whatsapp Hacking
Sipcheck
⭐
16
SIPCheck is a tool that watch the authentication of users of Asterisk and bans automatically if some user (or bot) try to register o make calls using wrong passwords.
Bsides Ldn 2019
⭐
15
Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA
Beefpurloin
⭐
15
Exploits USB HID to steal passwords saved in Google Chrome
Toucan Ids
⭐
15
An Intrusion Detection System written in Python
Related Searches
Python Docker (14,113)
Python Network (11,547)
Python Server (7,730)
Python Amazon Web Services (7,633)
Python Keras (6,661)
Python Google (6,420)
Python Cloud Computing (4,599)
Python Scanner (3,736)
Python Password (3,702)
Python Tutorials (3,517)
1-100 of 234 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2023 Awesome Open Source. All rights reserved.