Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security attacker
attacker
x
security
x
68 search results found
Maltrail
⭐
5,572
Malicious traffic detection system
Cowrie
⭐
4,889
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Cloudgoat
⭐
2,330
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool
Secure Ios App Dev
⭐
1,338
Collection of the most common vulnerabilities found in iOS applications
Labs
⭐
939
Vulnerability Labs for security analysis
Secure_rails
⭐
903
Rails security best practices
K8s Security
⭐
659
Kubernetes security notes and best practices
Hacking
⭐
515
hacker, ready for more of our story ! 🚀
Siem
⭐
489
SIEM Tactics, Techiques, and Procedures
Ssti Payloads
⭐
465
🎯 Server Side Template Injection Payloads
Decoymini
⭐
390
🐝 A highly scalable, safe, free enterprise honeypots 一款高可扩展、安全、免费的企业级蜜罐系统
Call For Wpa3
⭐
231
Call for WPA3 - what's wrong with WPA2 security and how to fix it
Toolanalysisresultsheet
⭐
201
Tool Analysis Result Sheet
Pentesting Playground
⭐
172
Code for installing various security minded tools onto Vagrant powered virtual machines
Tpmgenie
⭐
120
TPM Genie is an I2C bus interposer for discrete Trusted Platform Modules
Rememberme
⭐
115
A PHP library that implements secure "Remember me" cookies
Infosec Interview Questions
⭐
111
🗒️ A [work-in-progress] collection for interview questions for Information Security roles
Ecommerce Website Security Checklist
⭐
105
List of considerations for commerce site auditing and security teams. This is summary of action points and areas that need to be built into the Techinical Specific Document, or will be checked in the Security testing phases.
Django_cve_2019_19844_poc
⭐
92
PoC for CVE-2019-19844(https://www.djangoproject.com/weblo
Container Security Site
⭐
79
Livebox 0day
⭐
73
CVE-2018-20377; 20575; 20576; 20577 Multiple security vulnerabilities affecting latest firmware release on ORANGE Livebox modems.
Tslint Config Security
⭐
70
TSLint security rules
Memory Security
⭐
67
Tools for securely clearing and validating iOS application memory
Rsf
⭐
63
The Robot Security Framework (RSF), Robot Security Framework (RSF), a standardized methodology to perform security assessments in robotics.
Protocol Vul
⭐
59
Some Vulnerability in the some protocol are collected.
Security
⭐
49
Collection of CVEs from Sick Codes, or collaborations on https://sick.codes security research & advisories.
Defensomania
⭐
48
Defensomania is a security monitoring and incident response card game.
Analyst Casefile
⭐
43
Maltego CaseFile entities for information security investigations, malware analysis and incident response
Cve 2016 1764
⭐
41
Extraction of iMessage Data via XSS
Cve 2019 0986
⭐
39
Security Research
Xbackdoor
⭐
34
A tool for the persistent XSS exploitation with a focus for mobile web browsers
K8s Pod Rbac Breakout
⭐
34
Kubernetes Pod RBAC Breakout
Brutus
⭐
30
Botnet targeting Windows machines written entirely in Python & open source security project.
Opensvp
⭐
30
Opensvp is a security tool implementing "attacks" to be able to test the resistance of firewall to protocol level attack.
Openid Attacker
⭐
28
Piuser
⭐
25
👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡
2020 Machine Learning Security Evasion Competition
⭐
21
2020 Machine Learning Security Evasion Competition
Powsecurity
⭐
20
The source code used in the Oakland 2019 paper “Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security”
Vulnerabilities
⭐
18
List of every possible vulnerabilities in computer security.
Firmware Security Training
⭐
17
Intel ATR Training: Security of BIOS/UEFI System Firmware from Attacker and Defender Perspectives
Threads
⭐
16
THREADS Conference Archive
Data_obfuscation
⭐
14
Data Obfuscation for C/C++ Code Based on Residue Number Coding (RNC)
Lurker
⭐
14
Scalable security network sensor as low interaction honeypot
Endpoint
⭐
14
Linulator
⭐
13
🐧 The Linux Simulator
Ban2fail
⭐
13
Simple & efficient log file scanning and iptable filtering
Polymer Resin
⭐
12
XSS mitigation for Polymer webcomponents that uses safe html type contracts
Apekit
⭐
12
Mass Android app vulnerability analysis toolkit
Ssh_hardening
⭐
12
CERT NZ documentation for hardening SSH server and client configuration, and using hardware tokens to protect private keys
Interview_tips
⭐
12
Summary of Cyber Security interview questions I have been through, hope this helps
Uri
⭐
12
A secure URI generation and validation library
Pythia
⭐
10
Pythia is a set of RDMA-based remote side-channel attacks. USENIX Security 2019.
Web Security Interview Questions
⭐
10
🟣 Web Security Interview Questions Answered to help you get ready for your next tech interview.
Rethinking Honeywords
⭐
9
A Security Analysis of Honeywords
Waterline
⭐
9
Waterline Documentation
Outbound Rules
⭐
8
Reinventing the wheel; Content-Security-Policy
Miscreant.py
⭐
7
Python implementation of Miscreant: misuse-resistant encryption library with AES-SIV (RFC 5297) and AES-PMAC-SIV support
Attackersynthesis
⭐
7
🤖KORG: Tool, Models, and Supplementary Materials for Attacker Synthesis
Fake Admin Honeypot V1.1
⭐
7
🍯 New Honeypot Version: 1.2! 🐝 This pH7CMS module is a simple but effective honeypot fake Admin CP for the security of your website. Honeypot for the attackers!
Secant
⭐
7
Security Cloud Assessment Tool
Cve Fuzzing Poc
⭐
7
PoCs discovered through fuzzing which resulted in a CVE assignment.
Wordfence Lockout Msgs
⭐
7
Wordfence Custom "Lockout" and "Blocked" Messages that Maximize Security by minimizing information provided to attackers
Cve
⭐
7
A collection of vulnerabilities found through independent security research.
Httptrap
⭐
7
Web-server which produces infinite chunked-encoded responses to slowdown malicious clients
Opsec
⭐
6
Operational Security for everyone
Secure Webhosting Infra
⭐
5
WordPress, security, speed, backuping, webhosting, and tuned Apache2.4 server with php-fpm, chroot and other stuff.
Iot_attacker Point Of View
⭐
5
Whitepaper about IoT security from attackers eyes
Dicepass
⭐
5
Generate secure, pronouncable, rememberable passwords
Fake Admin Honeypot V1.2
⭐
5
🍯 pH7CMS Modula to setup a honeypot fake Admin CP to secure your social/dating site. Basically it's a honeypot for the attackers/hackers and track their behaviour!
Related Searches
Security Vulnerabilities (12,354)
Laravel Security (11,580)
Php Security (10,611)
Html Security (2,284)
Python Security (1,733)
Golang Security (1,316)
Shell Security (1,213)
Security Penetration Testing (920)
C Security (886)
Amazon Web Services Security (874)
1-68 of 68 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.