Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for python attacker
attacker
x
python
x
169 search results found
Theinfinitewebpage
⭐
14
This is a quick hack of a honeypot web server that serves an infinite web page. It is meant to fill the hard disk of the attacker when it automatically tries to download it.
Ikev1 Psk Main Mode Dict Attacker
⭐
13
Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode
Low Rate Tcp Dos Attack
⭐
12
Simulating a Low-Rate TCP DoS Attack in ns-3
Social Lstm For Predicting Player Trajectories In Soccer
⭐
12
Searching for a Strategy: Modelling Player Trajectories in Soccer Games using Social LSTM
Apekit
⭐
12
Mass Android app vulnerability analysis toolkit
Wificam
⭐
12
Honeypot built to mimic an insecure GoAhead Wifi Camera
Winmagic_sd
⭐
12
Technical Write-Up on and PoC Exploit for CVE-2020-11519 and CVE-2020-11520
Cve 2006 6184
⭐
11
This is a python-based standalone exploit for CVE-2006-6184. This exploit triggers a stack-based buffer overflows in Allied Telesyn TFTP Server (AT-TFTP) 1.9, and possibly earlier, allow remote attackers to cause a denial of service or execute arbitrary code.
Tailorms Rxss Keylogger
⭐
11
Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 allows remote attackers to harvest keys pressed via unauthenticated victim clicking malicious URL and typing.
Ca Uim Nimbus Research
⭐
10
Vulnerability research on the CA UIM Nimbus protocol
Serverless Wiki
⭐
10
A wiki that tries to require as little logic on the server as possible
Weblogic_automatical_attacker
⭐
10
Automatical Attacker for Weblogic
Cve 2020 9375
⭐
10
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
Fail2ban Analyse
⭐
10
Performs analysis of Fail2ban logs and outputs data in CSV, PNG and text formats plus a map overlay of IPs
Kippo_junos
⭐
10
Kippo configured to be a backdoored netscreen
Crossdomainscanner
⭐
10
Python tool to check for expired domains still allowed in crossdomain.xml files
Firedrill
⭐
9
Bypass firewall restrictions,Upgrade webshell to meterpreter and tunnel through a compromised machine to maintain access.
Mindmup As Attack Trees
⭐
9
Python scripts for using mindmup JSON as a medium for developing attack trees
Mfa_slipstream_poc
⭐
9
Proof of concept tool used for phishing multi-factor authentication on O365
Emergent Multiagent Strategies
⭐
9
Emergence of complex strategies through multiagent competition
Contexploit
⭐
9
Contec Smart Home unauthorized user added
Beacon_chain_simulator
⭐
8
Implements a prototype and interactive simulation for the sharded pos ethereum 2.0.
Openemr_vulnerabilities
⭐
8
OpenEMR 5.0.1 allows an authenticated attacker to upload and execute malicious php codes.
Passphrase Py
⭐
8
A cryptographically secure passphrase and password generator
Brute Force Appleid
⭐
8
This Script will brute force apple ID
Cve 2020 3452 Cisco Scanner
⭐
8
CVE-2020-3452 Cisco ASA Scanner -unauth Path Traversal Check
Firmware_web_rce_finder
⭐
8
FWRF is a open source tool for firmware web-side analysis.
Learning To Fool The Speaker Recognition
⭐
8
code for paper "learning to fool the speaker recognition"
Hashdetection
⭐
8
Hash Detection Tool
Starttls Everywhere
⭐
7
Enforceable TLS policies on known-good email domains
Pyrisk
⭐
7
Risk with python and ncurses
Vault
⭐
7
Simple scripts/notes and tools
Python Reddit Cnc
⭐
7
A Python based Reddit CnC
Cve 2017 5638
⭐
7
Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header
Vulnexipy
⭐
7
Vulnerabilities exploitation examples, python
Elabftw 1.8.5 Entitycontroller Arbitrary File Upload Rce
⭐
7
eLabFTW 1.8.5 'EntityController' Arbitrary File Upload / RCE (CVE-2019-12185)
Django_cve201919844
⭐
7
PoC for CVE-2019-19844 ( https://www.djangoproject.com/weblog/2019/dec/18/s )
Rse Adversarial Defense
⭐
7
An implementation for "Defense of Word-level Adversarial Attacks via Random Substitution Encoding"
Miscreant.py
⭐
7
Python implementation of Miscreant: misuse-resistant encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support
Poc 2020 8558
⭐
7
Information about Kubernetes CVE-2020-8558, including proof of concept exploit.
Attackersynthesis
⭐
7
🤖KORG: Tool, Models, and Supplementary Materials for Attacker Synthesis
Nos Damage
⭐
7
NosDamage is a damage calculator (and much more to come in the future) for the MMORPG NosTale.
Sigmafiltercheck
⭐
7
Check Sigma rules for easy-to-bypass whitelists to make them more robust (https://github.com/Neo23x0/sigma)
Kippo G0tmi1k
⭐
7
Personal fork of Kippo SSH honeypot.
Attack Engine
⭐
7
this is an offensive security tool
Jamming And Replay
⭐
7
A jamming-and-replay attack using SDR
Cve 2020 27199
⭐
6
CVE-2020-27199
Ssh User Enumeration
⭐
6
ssh user enumeration
Basic And Low Level Python Network Attacks
⭐
6
Basic and low-level Python Network Attacks
Breach_buster
⭐
6
Gzip middleware for django that protects (hopefully) against BREACH
Fail2ban P2p
⭐
6
Python application to distribute information about ips blocked by fail2ban in a p2p network
Cve 2018 11686
⭐
6
CVE-2018-11686 - FlexPaper PHP Publish Service RCE <= 2.3.6
Novault
⭐
6
Stateless Password Manager and Brain Wallet (CLI)
Poodle
⭐
6
Working exploit code for the POODLE attack on SSLv3
Exploitingformatstringvulnerabilities
⭐
6
Research project on Automating Exploitation on Format String Vulnerabilities
Iot Securitychecker
⭐
5
IoT Security Checker is a framework for automating some IoT-related security checks
R4b
⭐
5
R4B, a backdoor based on reverse port opening so as to avoid firewall detection.
Vulnerability Reports And Pocs
⭐
5
A repository hosting some of my own vulnerability reports and proof-of-concepts.
Filtor
⭐
5
A whitelisting proxy for the Tor control port.
Authloginspect
⭐
5
Parse and geolocate ssh login attempts from log file using http://freegeoip.net/json/
Session Invalidation
⭐
5
InfoSec incident response tool for terminating sessions of compromised user accounts
Mptcp Exploit
⭐
5
Testing MPTCP vulnearibilites using MPTCP-compatible suite of scapy from repo: nimai/mptcp-scapy
Trespass
⭐
5
A php backdoor complete a python 3 attacker client.
Rainbow6 Siege Danmu Request
⭐
5
A Rainbow Six Siege operator request queue using live danmu
Grad Neurips22
⭐
5
PyTorch Implementation for NeurIPS 2022 paper 'Towards Reasonable Budget Allocation in Untargeted Graph Structure Attacks via Gradient Debias'
Dnsspoofer
⭐
5
DNSspoofer is an application that (1) intercepts traffic by performing a man-in-the-middle attack through the use of ARP poisoning, and then (2) replies to all DNS queries with a desired IP.
Kaosk Backdoors
⭐
5
Automate the creation of Backdoors and postexplotation activities
Honssh Scripts
⭐
5
Python and shell scripts for analysis of honssh logs
Spiderfoot
⭐
5
Conceptronicipcam_multiplevulnerabilities
⭐
5
[CVE-2018-6407 & CVE-2018-6408] Conceptronic IPCam Administration panel CSRF and Denial of Service
Related Searches
Python Docker (14,113)
Python Network (11,495)
Python Html (10,924)
Python Server (7,793)
Python Amazon Web Services (7,633)
Python Google (6,420)
Python Cloud Computing (4,599)
Python Scanner (3,736)
Python Password (3,683)
Python Tutorials (3,517)
101-169 of 169 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.