Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for c plus plus attack
attack
x
c-plus-plus
x
131 search results found
Openrasp
⭐
2,638
🔥Open source RASP solution
Firesheep
⭐
2,222
A Firefox extension that demonstrates HTTP session hijacking attacks.
Slowhttptest
⭐
1,395
Application Layer DoS attack simulator
Bkcrack
⭐
1,316
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Hashpump
⭐
1,080
A tool to exploit the hash length extension attack in various hashing algorithms
Functionstomping
⭐
643
A new shellcode injection technique. Given as C++ header, standalone Rust program or library.
Hashclash
⭐
606
Project HashClash - MD5 & SHA-1 cryptanalysis
Pplkiller
⭐
583
Tool to bypass LSA Protection (aka Protected Process Light)
Esp8266_beaconspam
⭐
516
Creates up to a thousand WiFi access points with custom SSIDs.
Rattler
⭐
318
Automated DLL Enumerator
Whitebox Crypto Aes
⭐
291
Whitebox AES implementation in C++. Chow, Karroumi.
Udsim
⭐
215
Cbm
⭐
199
Car Backdoor Maker
Byeintegrity Uac
⭐
143
Bypass UAC by hijacking a DLL located in the Native Image Cache
Living Off The Land
⭐
141
Fileless attack with persistence
Daredevil
⭐
136
A tool to perform (higher-order) correlation power analysis attacks (CPA).
Meltdown Poc
⭐
130
A PoC implementation of the meltdown attack described in https://meltdownattack.com/meltdown.pdf
Drama
⭐
120
This repository contains examples of DRAMA reverse-engineering and side-channel attacks
Tpmgenie
⭐
120
TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules
Flashsploit
⭐
111
Exploitation Framework for ATtiny85 Based HID Attacks
Memoryranger
⭐
111
MemoryRanger protects kernel data and code by running drivers and hosting data in isolated kernel enclaves using VT-x and EPT features.
Guardion
⭐
74
Android GuardION patches to mitigate DMA-based Rowhammer attacks on ARM
Unitaint
⭐
70
PoC for a taint based attack on VMProtect
Ntpdoser
⭐
66
NTP Doser is a NTP Amplification DoS/DDoS attack tool for penttesting
Sentinel
⭐
64
Sentinel is a command line tool able to protect Windows 32 bit programs against exploits targeted by attackers or viruses. It can protect your programs against 0-day attacks or publicly known bugs.
Ropguard
⭐
63
Runtime Prevention of Return-Oriented Programming Attacks
Busysteg
⭐
59
👻 Hide information content into busy areas of images, optimally
Wannafix
⭐
52
WANNAFIX is a mitigation script for the recent WANNACRY Ransomware attack
Etherbeat
⭐
48
With the growing popularity of BitCoin in the last couple of years, other blockchains have been in development for solving various problems that need distributed consensus. Ethereum blockchain is one example, that gives users to develop "smart contracts" that runs in the blockchain. This gives the ability to develop decentralized applications (or dApps). Users do not need to 'trust' anything or anybody. In addition to that, dApps are always available and will be guaranteed to be available in t
Face Anti Spoofing For Rgb
⭐
48
An Face Anti-spoofing Method for Print and Video Attacks
Badusb_examples
⭐
46
This repository have some BadUSB attack examples for Arduino IDE compatible devices
Digitrack
⭐
44
Attacks for $5 or less using Arduino
Robusttrees
⭐
43
[ICML 2019, 20 min long talk] Robust Decision Trees Against Adversarial Examples
Monopticon
⭐
42
Monitor ethernet traffic in real time with a 3D backend.
Fuzzle
⭐
41
A stateful fuzzing engine.
Ms Rms Attacks
⭐
41
Breaking the security of Microsoft's RMS
Yy Guard
⭐
40
Mitigating DLL preloading attacks.
Glitchsink
⭐
40
Voltage glitcher to bypass instructions/bootloader protections *without* target modification
Sanctum
⭐
40
Minimal RISC Extensions for Isolated Execution
Ddosmon
⭐
40
Another old project that I've found lost in an old HD, DDOS Monitor
Languagebackdoors
⭐
38
Compiler exploits and exploitable non-obvious source code back doors.
Badnets
⭐
36
Goatattack
⭐
35
Goat Attack - Fast-Paced Multiplayer Pixel Art Shooter Game.
Surge
⭐
34
A fast bitboard-based chess move generator in C++
Blockattack Game
⭐
33
Block Attack - Rise of the Blocks - the game
Face Anti Spoofing
⭐
31
Face Anti-spoofing demo to detect print, video replay, and mask attack by using LBP features and rPPG features.
Byeintegrity2 Uac
⭐
28
Bypass UAC by abusing the Internet Explorer Add-on installer
D2moddingtoolset
⭐
28
Mss32 proxy DLL for Disciples 2
Screwssh
⭐
27
A frighteningly-easy way of denying access to someone's publicly-accessible OpenSSH server in a default configuration. Originally written by Boris Kochergin.
Pam_schroedinger
⭐
25
Uncertainty for brute forcers during login.
Memwars
⭐
25
Kadabra
⭐
24
[DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.
Badusb Targeting Android
⭐
23
a proof of concept badUSB attack which install a apk on Android
Nfcopy85
⭐
23
NFCopy85 is a 10 dollars device to make replay attacks against NFC payment systems.
Alice In Clicheland
⭐
22
A short RPG game made with Allegro 4 and C++.
Avalanche
⭐
21
Minecraft server stress test tool.
Syntherrupter
⭐
20
Powerful MIDI interrupter with touchscreen for up to 6 tesla coils and 16 voices per coil.
Byeintegrity3 Uac
⭐
20
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Cryptotools
⭐
20
Tools for attacking cryptographic implementations.
Mfrc522_nested_attack
⭐
19
mifare nested authentication attack with the MFRC522 reader
Vesper
⭐
19
A man in the middle detection tool for LANs
Petya_green
⭐
19
Application for random attack on Green Petya's key
Sha1_gpu_nearcollisionattacks
⭐
19
GPU code for the first SHA-1 collision attack and two freestart attacks
Remote Process Cookie For Windows 7
⭐
18
Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.
Zelda Game
⭐
18
👽 A text based adventure game made using concepts of OOP like Inheritance, Composition, Association, Polymorphism etc
Byeintegrity5 Uac
⭐
17
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Ssh Attack Stats
⭐
17
A simple script that will run in MOTD on a linux server and will tell you the attack statistics
Sepm Eop
⭐
17
CVE-2018-18368 SEP Manager EoP Exploit
Cache Model
⭐
17
A behavioural cache model for analysing the cache behaviour under side-channel attack.
Code Imitator
⭐
16
T Sgx
⭐
15
Compiler-based tool that protects Intel SGX applications against controlled-channel attacks
Gammaenv
⭐
13
DSP S-curve envelope signal generator/low-pass filter C++
Ndnsim Ddos Interest Flooding
⭐
13
Script scenarios and graph processing scripts for simulations used in "Interest Flooding Attack and Countermeasures in Named Data Networking" paper by Afanasyev et al. (IFIP Networking 2013)
Fsdefender
⭐
13
Technion CS Ransomware Project: Writing Windows Mini-Filter Driver to protect PC from Ransomware
Fastdns
⭐
12
Fast Recursive DNS server
Dstar
⭐
12
DHCP attack tool 👿
Teensy Android Pin Bruteforcer
⭐
12
a BruterForcer for Teensy, works with 4 and 5 digit pins, tested on Android 4.4.2. and Teensy 2.0, but it works on any kind of Teensy, it does not work on new versions of android with temporal blocks that increase according to the attempts
Tree Ensemble Attack
⭐
11
[NeurIPS 2020] Code for "An Efficient Adversarial Attack for Tree Ensembles"
Byeintegrity4 Uac
⭐
11
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Flush Reload
⭐
11
A flush-reload side channel attack implementation
Hid Attacks
⭐
11
Arduino (Teensy) Based HID Attacks with Metasploit Modules
Pay To Sudoku Attack
⭐
10
Triptych
⭐
10
Triptych of Digital Mirrors for Intel to show the qualities of their Ivy Bridge Processor
Codext Ugly
⭐
10
The good, the bad, and the ugly of CodeXt mid-dissertation writing. Just something to get the code online.
Homophonic Cipher Attack
⭐
10
Efficient cryptanalysis of homophonic substitution ciphers
Esp32 Div
⭐
10
Packet Monitor, WiFi Analyzer, Beacon Spam, Deauth Detector
Metin2 Akira Metasploit
⭐
9
Hybrid client emulator (python and C++) for Metin2.
Werewolves Vampires
⭐
9
Werewolves vs Vampires: A game created with SDL2
Symlinkprotect
⭐
9
File system minifilter driver for Windows to block symbolic link attacks.
Simonspeck
⭐
9
Simon & Speck block cipher implementation open source code in C
Hulk
⭐
8
Hulk is able to bruteforce missing bytes after a DCA attack on AES with his special ability of AES-NI
Md5 Collisions
⭐
8
md5 collision tests
Hearthstone Cl
⭐
8
An experimental command-line Hearthstone simulator in C++
Thewitcher
⭐
8
The Witcher: A Bard's Tale
Snort3 Plugin Ml
⭐
8
Nacafoil Openfoam
⭐
8
OpenFOAM case files for simulating NACA foils.
Glaurung
⭐
7
Free UCI Chess engine created by Tord Romstad
Forsitan Modulare
⭐
7
forsitan modulare for VCV Rack
Pancake
⭐
7
System that employs frequency smoothing to protect key-value stores from frequency analysis attacks.
Anti Face Spoofing
⭐
7
Implementation of LDP-TOP in face spoofing detection
Related Searches
C Plus Plus Cmake (8,712)
C Plus Plus Qt (8,557)
C Plus Plus Video Game (8,255)
C Plus Plus Algorithms (6,194)
C Plus Plus Opengl (4,396)
C Plus Plus 3d Graphics (3,196)
C Plus Plus Testing (2,735)
Java C Plus Plus (2,629)
C Plus Plus Command Line (2,304)
Python Attack (2,252)
1-100 of 131 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.