Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c attack
attack
x
c
x
222 search results found
Eaphammer
⭐
1,832
Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.
Tinc
⭐
1,810
a VPN daemon
Ctftool
⭐
1,549
Interactive CTF Exploration Tool
Reaver Wps Fork T6x
⭐
1,520
Wifi Arsenal
⭐
1,049
WiFi arsenal
Thc Ipv6
⭐
916
IPv6 attack toolkit
Mfcuk
⭐
870
MiFare Classic Universal toolKit (MFCUK)
Hash_extender
⭐
862
Bitcracker
⭐
699
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Spectre Attack
⭐
662
Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
S6_pcie_microblaze
⭐
642
PCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor, check readme for links and info
Hitcon Training
⭐
602
For Linux binary Exploitation
Deadpool
⭐
598
Repository of various public white-box cryptographic implementations and their practical attacks.
Opensesame
⭐
566
OpenSesame attacks wireless garages and can open most fixed-code garages and gates in seconds using a Mattel toy
Yersinia
⭐
557
A framework for layer 2 attacks
Hostapd Mana
⭐
479
SensePost's modified hostapd for wifi attacks.
Scrypt
⭐
448
The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.
Sgx Step
⭐
400
A practical attack framework for precise enclave execution control
Maskprocessor
⭐
347
High-Performance word generator with a per-position configureable charset
Exploit Cve 2017 7494
⭐
328
SambaCry exploit and vulnerable container (CVE-2017-7494)
Revanc
⭐
327
Reverse Engineering Page Table Caches in Your Processor
Bully
⭐
319
Dark Souls Pvp Ai
⭐
293
AI for playing (and winning) in dark souls pvp
Scrypt
⭐
256
A Ruby gem with native C extension for the scrypt password hashing algorithm.
Zizzania
⭐
255
Automated DeAuth attack
Bitcoin Hacking Tools
⭐
209
The source code of main tools used in Bitcoin "non-malware-based" attacks.
Spectre Attack Sgx
⭐
203
Spectre attack against SGX enclave
Silentbridge
⭐
191
Silentbridge is a toolkit for bypassing 802.1x-2010 and 802.1x-2004.
Davegrohl
⭐
177
A Password Cracker for macOS
Cs253.stanford.edu
⭐
171
CS 253 Web Security course at Stanford University
Blacknurse
⭐
165
BlackNurse attack PoC
Reaver Wps
⭐
164
Brute force attack against Wifi Protected Setup
Cbrutekrag
⭐
158
Penetration tests on SSH servers using brute force or dictionary attacks. Written in C.
Midgetpack
⭐
158
midgetpack is a multiplatform secure ELF packer
Mario_baslr
⭐
148
PoC for breaking hypervisor ASLR using branch target buffer collisions
Crypto1_bs
⭐
148
Bitsliced Crypto-1 brute-forcer
Iot Malware
⭐
147
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code
Meltdown Poc
⭐
141
A quick PoC to try out the "meltdown" timing attack.
Pangu
⭐
137
Toolkit to detect/crash/attack GNU debugging-related tools
Flush_flush
⭐
127
This repository contains examples of Flush+Flush cache attacks
Cache_template_attacks
⭐
122
This repository contains several tools to perform Cache Template Attacks
Nailgun
⭐
116
Nailgun attack on ARM devices.
Stunning Signature
⭐
116
Native Signature Verification For Android (with example)
Roguehostapd
⭐
115
Hostapd fork including Wi-Fi attacks and providing Python bindings with ctypes.
Compsecattacklabs
⭐
107
Contains Attack labs
Truecrack
⭐
95
TrueCrack is a brute-force password cracker for TrueCrypt (Copyrigth) volumes. It works on Linux and it is optimized for Nvidia Cuda technology.
Licster
⭐
89
A Low-cost ICS Security Testbed for Education and Research
Heap_exploit_2.31
⭐
89
Wificurse
⭐
86
WiFi Jamming tool
Maliciousdllgenerator
⭐
86
DLL Generator for side loading attack
Rhme 2015
⭐
84
RHme+ 2015 challenge
Dragonslayer
⭐
82
Libdetection
⭐
76
Signature-free approach library to detect injection and commanding attacks
Cowpatty
⭐
76
coWPAtty: WPA2-PSK Cracking
Honeytrap
⭐
75
a low-interaction honeypot
Espbug
⭐
75
ESPBug is a rogue captive portal program which runs on the ESP8266 dev board, such as the NodeMCU (clones included). It is a social engennering tool which generates a WiFi network of a given name alluring people to connect to it and enter some credentials.
Nemesis
⭐
75
Nemesis: Studying microarchitectural timing leaks in rudimentary CPU interrupt logic
Spectre Attack Demo
⭐
73
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Adversarial Learning Robustness
⭐
71
Contains materials for workshops pertaining to adversarial robustness in deep learning.
Ddos Scripts
⭐
70
This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.
Rootstealer
⭐
70
X11 trick to inject commands on root terminal.
Sqlassie
⭐
68
database firewall
Cachegrab
⭐
67
a tool designed to help perform and visualize trace-driven cache attacks against software in the secure world of TrustZone-enabled ARMv8 cores
Lilac_2020_summer_pwn
⭐
65
Lilac 2020暑期pwn培训课件以及相关文件
Exploit Blacknurse
⭐
58
Black Nurse DOS attack
Dragondrain And Time
⭐
58
Mod_evasive
⭐
52
Apache mod_evasive module
Smotherspectre
⭐
49
Proof-of-concept code for the SMoTherSpectre exploit.
Dns Amplification Attack
⭐
48
Buffer Overflow Attack
⭐
46
This is an example buffer overflow attack on a small vulnerable C program.
Krackattacks Test
⭐
45
Exploit Cve 2017 5715
⭐
43
Spectre exploit
Speculator
⭐
42
Tool to Analyze Speculative Execution Attacks and Mitigations
Auto_eap
⭐
42
Automated Brute-Force Login Attacks Against EAP Networks.
Penetrator Wps
⭐
40
new WPS attack tool
Flush Reload
⭐
39
[UNMAINTAINED] Implementation of the FLUSH+RELOAD side channel attack
Asleap
⭐
39
Asleap - Cisco LEAP and Generic MS-CHAPv2 Dictionary Attack
Byeintegrity8 Uac
⭐
38
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Linux Rootkits Red Blue Teams
⭐
37
Linux Rootkits (4.x Kernel)
Honeytrap
⭐
34
Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner
Mod_evasive
⭐
33
Fork of mod_evasive for Apache 2.4. Original module by Deep Logic, Inc
Swapgs Attack Poc
⭐
32
This repository contains the sources and documentation for the SWAPGS attack PoC (CVE-2019-1125)
Krack Attack
⭐
32
ABANDONED: Windows provides no mechanism for injecting packets
C0ntextomy
⭐
32
CVE-2020-9992 - A design flaw in MobileDevice.framework/Xcode and iOS/iPadOS/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device
Ed448 Goldilocks
⭐
31
Mirror of http://sourceforge.net/p/ed448goldilocks/code/ci/m
Hexpads
⭐
31
HexPADS, a host-based, Performance-counter-based Attack Detection System
Activationcontexthook
⭐
30
Mitm
⭐
30
Man in the middle tool
Ilcoin Master
⭐
29
ILCoin Source with integration of C2P & Rift protocols.
Nestdfuattack
⭐
28
Packages to attack the Google Nest's DFU mode.
Ratched
⭐
28
Ratched is a transparent Man-in-the-Middle TLS proxy intended for penetration testing
Typearmor
⭐
28
Implementation of our S&P16 paper: A Tough Call: Mitigating Advanced Code-Reuse Attacks
Krackattack All Zero Tk Key
⭐
27
This code has base on a code made by Mathy Vanhoef (https://github.com/vanhoefm/krackattacks-poc-zero Please, take a look on README.md. Enjoy!
Os Fingerprinting
⭐
27
Operating system remote fingerprinting attack and detection tools
Beaglehash
⭐
26
Fast 64 bit evolved hash.
Mod_dosdetector
⭐
26
An apache module for detecting DoS attacks
Sctf2017
⭐
26
Samsung CTF 2017 Problems. https://sctf.codeground.org
Ladderleak Attack Ecdsa
⭐
26
Sidh Writeup
⭐
26
Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"
Bully
⭐
25
Brute force attack against WPS, that actually works
Related Searches
C Kernel (12,842)
C Video Game (4,242)
C Driver (4,106)
Python C (4,069)
C Firmware (3,545)
C Arduino (3,118)
C Usb (2,589)
C Arm (2,566)
C Command Line (2,475)
C Algorithms (2,333)
1-100 of 222 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.