Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for shell attack
attack
x
shell
x
125 search results found
Payloads
⭐
3,289
Git All the Payloads! A collection of web attack payloads.
Blocklist Ipsets
⭐
2,813
ipsets dynamically updated with firehol's update-ipsets.sh script
Socialbox Termux
⭐
2,487
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi Edit By samsesh for termux on android
Ighack
⭐
1,448
Hack Instagram From Termux With Help of Tor
Socialbox
⭐
1,298
SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi
Chimera
⭐
1,192
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Lfisuite
⭐
855
Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
Htshells
⭐
801
Self contained htaccess shells and attacks
Wpforce
⭐
657
Wordpress Attack Suite
Generate Macro
⭐
615
This Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method.
Ddos Deflate
⭐
608
Fork of DDoS Deflate with fixes, improvements and new features.
Hashcatch
⭐
513
Capture handshakes of nearby WiFi networks automatically
Modwifi
⭐
441
Wirespy
⭐
407
Framework designed to automate various wireless networks attacks (the project was presented on Pentester Academy TV's toolbox in 2017).
Pentmenu
⭐
382
A bash script for recon and DOS attacks
Instashell
⭐
256
Armor
⭐
238
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
H4rpy
⭐
191
Automated WPA/WPA2 PSK attack tool.
Router_badusb
⭐
175
BadUSB in Routers
T14m4t
⭐
165
Automated brute-forcing attack tool.
Milazycracker
⭐
155
Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
Pakuri
⭐
140
PAKURI has been merged with Python and launched as a new project, PAKURI-THON.
Mazda_getinfo
⭐
137
A PoC that the USB port is an attack surface for a Mazda car's infotainment system and how Mazda hacks are made
Relayer
⭐
135
SMB Relay Attack Script
Ws Docker Community
⭐
127
Web Sight Docker Deployment
System.ben
⭐
119
Who says you can't be super fast and super secure
Flashsploit
⭐
111
Exploitation Framework for ATtiny85 Based HID Attacks
Php Backdoors
⭐
101
PHP shell backdoors list ( collection )
Elk Detection Lab
⭐
94
An ELK environment containing interesting security datasets.
The World Is Yours
⭐
91
Nginx L7 DDoS Protection! And many more features 💥 ⚡
Milazycracker
⭐
81
Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
Antiddos
⭐
80
A very simple script that uses special iptables rules and sysctl tweaks that protects your server(s) against many different network attacks.
Jiyu_udp_attack
⭐
80
极域电子教室数据包(udp)重放攻击脚本
Cloudflare Block
⭐
78
Bash script that automatically activates Cloudflare's "I'm Under Attack!" mode if the server detects an attack.
Ddos
⭐
76
script simple [DDOS] Distributed danial of service
N4p
⭐
59
Offensives network security framework for Wireless and MiTM style hacking
Network Attacker
⭐
57
Programmed For Penetration Testing Beginners . This Program Based on Mdk3 . "WiFi Stress Testing Beacon Flooding & Deauthentication Attack "
Cfautouam
⭐
53
Automatically enables CloudFlare Under Attack Mode - Bash Script
Dtpscan
⭐
51
Detects Cisco DTP modes for VLAN Hopping (passive detection)
Ska
⭐
49
Simple Karma Attack
Dns Fender
⭐
48
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Apkinjector
⭐
46
Android APK Antivirus evasion for msfvenom generated payloads to inject into another APK file for phishing attacks.
Auto Reaver
⭐
46
Auto Reaver - multiple access point attack using Reaver
Login Shield
⭐
36
Your first line of defense against Internet bots, hacks and probes. Login-Shield is a small set of bash scripts that implements an iptables/ipset blocklist of known sources of hack activity. Works great as a compliment with/without fail2ban. Statistics have shown it blocks 90+% of most system probes and attacks on login ports.
Daedalus
⭐
36
Exploring various defensive response options for effectively securing a 5G core-network
Blocklist Abuseipdb
⭐
36
Abuseipdb IP Aggregator
Hack Instagram
⭐
35
thia tool hack instagram from attack password and fund password no block
Cve 2023 22518
⭐
35
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
Crackpkcs12
⭐
32
A multithreaded program to crack PKCS#12 files (p12 and pfx extensions)
Smbaudit
⭐
32
Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.
Atat
⭐
31
Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.
Hardenedpaste
⭐
30
[Retired] Hardened Paste is a browser extension that prevents the “pastejacking” exploit.
Defcon 23 Presentation
⭐
30
USB Attack to Decrypt Wi-Fi Communications
Wifibang
⭐
29
wifi attacks suite
5xddos
⭐
28
5xDDoS is a DDoS tool with great attack power, be careful when using it
Conformer
⭐
28
Password Guessing for different Web Portals
Turningweaknessintostrength
⭐
26
Official implementation for paper: A New Defense Against Adversarial Images: Turning a Weakness into a Strength
Backdoorbash
⭐
24
Unix remote-shell backdoor develop with Bash, Netcat, OpenSSL (data encryption with AES-128bit)
Deadlysignals
⭐
22
Fake AccessPoint Attack
Fluxion
⭐
21
Now You will crack WPA/2 easily ......!!!!
Overflow
⭐
21
Microsoft Flow Attack Framework
Deny Ssh Password Attack
⭐
21
Openwrt 自身没有对抗ssh破解的工具,为了暴露在互联网的路由器更加安全,基于iptables编写了一个小脚本 脚本通过crontab定时执行,
Directadmin Bfm Csf
⭐
21
A set of scripts to let Brute Force Monitor in DirectAdmin to block IPs using CSF/LFD. If you need custom installation or support please feel free to request it here or on our site
Longtail Log Analysis
⭐
18
Cc Attack Protector
⭐
16
A pure shell script that can protect your VPS under CC attack. 鸟语水平屌差,README还是用中文写吧……
Autoenable Cloudflare Uam
⭐
16
Auto-enable Cloudflare "Under Attack" mode when CPU load is high
Fluxion
⭐
16
Fluxion is a security auditing and social-engineering research tool. It is a remake of linset by vk496 with (hopefully) less bugs and more functionality. The script attempts to retrieve the WPA/WPA2 key from a target access point by means of a social engineering (phishing) attack. It's compatible with the latest release of Kali (rolling). Fluxion's attacks' setup is mostly manual, but experimental auto-mode handles some of the attacks' setup parameters. Read the FAQ before requesting issues. If
Getda.sh
⭐
15
Identify common attack paths to get Domain Administrator
Tcp Testsuite
⭐
15
TCP Testsuite for FreeBSD based on Packetdrill
Instahack
⭐
15
Hack instagram bruteforce new
Wisec
⭐
14
A tool with the most options available to attack WI-FI Networks.
Docker Mitm
⭐
14
Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire
Attack Shell
⭐
14
Attack Shell a.k.a. Ani-Shell is a simple PHP shell with some unique features like Mass Mailer, a simple Web-Server Fuzzer, Dosser, Back Connect, Bind Shell, Back Connect, Auto Rooter etc.
Wps Slaughter
⭐
14
This tool helps to automate the process of testing router WPS vulnerability to flood attacks using multiple* wireless adapters to see if it will reboot and UNLOCK.
Wi Ploit
⭐
13
Wi-Fi Exploit Tool
Eagleeye
⭐
13
EagleEye DDoS Tool version 2.1
Cowrie Attack
⭐
13
Mapping the ATT&CK matrix in a Cowrie honeypot
Ddosutil
⭐
12
ddoSutil (ddos utilities) is a series of Linux scripts intended to help deal with various ddos attack methods
Ctfpwnng
⭐
12
Automation framework for attack-defense CTFs.
Intro To Computer Systems
⭐
12
15-213计算机导论(深入理解计算机系统) lab
Wifi_wardriving
⭐
11
Some scripts and stuff for wardriving and wifi hacks .... works great on kali and ubuntu 32 bit ...Reaver likes 32 bit binaries.
Arcane
⭐
11
Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.
Container Security
⭐
11
Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides
Ddos Attack Tools
⭐
11
Comprises of 5 ddos attack tools
Wpa Attack
⭐
11
WPA Attack - Easy breaking WPA WPA2 networks by typing one command
Secure_kali
⭐
11
How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports or launch attacks against your apache web server and more
Slipm Honeypot
⭐
11
A simple low-interaction port monitoring honeypot.
Injector
⭐
11
Injector a.k.a tr4c1l0rds is a tool to run simultaneous sql injections attacks anonymously using containers.
Mass_deauth
⭐
10
Script to mass deauthenticate multiple wireless clients.
Ddos Deflate
⭐
10
Shell script blocking DDoS attacks. Not maintained since 2016
Adversarial Attack On Gmm I Vector Based Speaker Verification Systems
⭐
10
Implementation of Adversarial Attacks on GMM i-vector based Speaker Verification Systems (ICASSP2020) https://arxiv.org/abs/1911.03078
Zombie Revolution Environment
⭐
10
a randomized zombie world simulator
Mitre_edr_eval
⭐
9
Parsing MITRE EDR Evaluation results
Wificracker
⭐
9
Program made in bash that allows you to obtain Wifi's passwords. Program works with WPA/WPA2 protocol using PSK authentication.
Learn Ethical Hacking From Scratch_
⭐
9
Learn Ethical Hacking From Scratch, published by Packt
Mock Dao Hack
⭐
9
Simplified "DAO" contract and attacker contract to recursively exploit it
Dns Cache Poisoning With Scapy
⭐
9
Project for a Computer Security class based on CSAW capture the flag challenges
Httpstime
⭐
9
Setting the system time over HTTPS
Sagittariusec
⭐
9
SEC ruleset for common exploit patterns and my master thesis
Openfoam Naca2412
⭐
8
OpenFOAM case for simulating the flow over a NACA 2412 airfoil.
Related Searches
Shell Docker (20,660)
Shell Script (15,351)
Shell Bash (10,338)
Shell Command Line (6,542)
Shell Dotfiles (5,338)
Shell Git (4,715)
Shell Ansible (4,427)
Shell Server (3,563)
Shell Ssh (3,562)
Shell Docker Image (3,406)
1-100 of 125 search results
Next >
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.