Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack vulnerabilities
attack
x
vulnerabilities
x
49 search results found
Awesome Web Hacking
⭐
5,260
A list of web application security
W3af
⭐
4,142
w3af: web application attack and audit framework, the open source web vulnerability scanner.
Cdk
⭐
3,267
📦 Make security testing of K8s, Docker, and Containerd easier.
Awesome Termux Hacking
⭐
2,550
⚡️An awesome list of the best Termux hacking tools
Zen Rails Security Checklist
⭐
1,632
Checklist of security precautions for Ruby on Rails applications.
Singularity
⭐
937
A DNS rebinding attack framework.
Wapiti
⭐
896
Web vulnerability scanner written in Python3
Solidity Security Blog
⭐
835
Comprehensive list of known attack vectors and common anti-patterns
Pentesttools
⭐
816
Awesome Pentest Tools Collection
Terrapin Scanner
⭐
811
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Noscript
⭐
742
The popular NoScript Security Suite browser extension.
Hacking
⭐
515
hacker, ready for more of our story ! 🚀
Vulns
⭐
388
Named vulnerabilities and their practical impact
Tcp Starvation
⭐
349
Keyshuffling
⭐
340
Keyshuffling Attack for Persistent Early Code Execution in the Nintendo 3DS Secure Bootchain
Shadowsocks
⭐
330
Redirect attack on Shadowsocks stream ciphers
Ble Security Attack Defence
⭐
224
✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth LE stacks.
Ed25519 Unsafe Libs
⭐
208
List of unsafe ed25519 signature libs
Hadoop Attack Library
⭐
200
A collection of pentest tools and resources targeting Hadoop environments
Atear
⭐
177
Wireless Hacking, WiFi Security, Vulnerability Analyzer, Pentestration
Beehive
⭐
156
Beehive is an open-source vulnerability detection framework based on Beebeeto-framework. Security researcher can use it to find vulnerability, exploits, subsequent attacks, etc.
Worldsfirstsha2vulnerability
⭐
153
Sha256 vulnerability for full rounds. Circular hash attack.
R00kie Kr00kie
⭐
148
PoC exploit for the CVE-2019-15126 kr00k vulnerability
Pakuri
⭐
140
PAKURI has been merged with Python and launched as a new project, PAKURI-THON.
Offensive Dockerfiles
⭐
132
Offensive tools as Dockerfiles. Lightweight & Ready to go
Secureserver
⭐
125
A Simple, Secured Default HTTP(S) Server for Golang
System.ben
⭐
119
Who says you can't be super fast and super secure
Nailgun
⭐
116
Nailgun attack on ARM devices.
Cryptodeeptools
⭐
110
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Tiger
⭐
108
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
List Of Web Application Security
⭐
107
List of web application security
Compsecattacklabs
⭐
107
Contains Attack labs
Davoset
⭐
106
DDoS attacks via other sites execution tool (DAVOSET) - it is command line tool for conducting DDoS attacks on the sites via Abuse of Functionality and XML External Entities vulnerabilities at other sites.
Nonce Disrespect
⭐
102
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Metasploit Autopwn
⭐
102
db_autopwn plugin of metasploit
Wapiti
⭐
93
A web-application vulnerability scanner
Slowloris
⭐
89
Asynchronous Python implementation of SlowLoris DoS attack
In Spectre Meltdown
⭐
84
This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs enabling attackers to read data they shouldn't be able to. This tool is originally based on Microsoft: https://support.microsoft.com/en-us/help/4073119/p
Caldera_pathfinder
⭐
84
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
Security_examples
⭐
77
Rails application to demo CSRF, XSS, and XXE vulnerabilities and how to avoid them
Poodle
⭐
74
A Proof of Concept for the POODLE vulnerability in SSLv3
Shiro 721
⭐
61
RememberMe Padding Oracle Vulnerability RCE
Ids Evasion
⭐
59
Evading Snort Intrusion Detection System.
Phaser
⭐
53
Automated attack surface mapper and vulnerability scanner (Work In Progress 🚧)
Attack Surface Detector Burp
⭐
50
The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Xssmap
⭐
49
Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Awesome Tls Hacks
⭐
42
A collection of SSL/TLS security related resources.
Sql_injection_payload
⭐
42
SQL Injection Payload List
Timeless Timing Attacks
⭐
41
A Python implementation that facilitates finding timeless timing attack vulnerabilities.
Drupalgeddon
⭐
39
Examples of common attack vectors and defenses against the drupalgeddon SQL injection vulnerability
Cve 2023 22518
⭐
35
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
Attack Surface Detector Zap
⭐
35
The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters
Awesome Security Articles
⭐
34
This repository contains links to awesome security articles.
Onesie Life
⭐
34
🔓 Onesie.life is a fictional social media network that has intentional vulnerabilities
Vmware_guest_auth_bypass
⭐
28
Proof of concept of VMSA-2017-0012
Vulntology
⭐
26
Development of the NIST vulnerability data ontology (Vulntology).
Xss Cheatsheet
⭐
25
XSS Cheatsheet - A collection of XSS attack vectors https://xss.devwerks.net/
Memwars
⭐
25
Browserrecon Php
⭐
19
Advanced Web Browser Fingerprinting
Computersecurityattacks
⭐
18
Contains SEED Labs solutions from Computer Security course by Kevin Du.
Bwapp Code
⭐
18
clone of http://sourceforge.net/projects/bwapp/
Rposcanner
⭐
17
Relative Path Overwrite Vulnerability Scanner
Seedlab
⭐
17
Records & Reports for Seed-project
Eos_known_attacks
⭐
16
Repository of EOS Smart Contract known attacks to help devs prevent known vulnerabilities in their contracts
Cyber Attacks
⭐
16
A collection of attacks metadata that were used in my previous pen-test tools
Waftester
⭐
14
WAF Testing Tool
Wps Slaughter
⭐
14
This tool helps to automate the process of testing router WPS vulnerability to flood attacks using multiple* wireless adapters to see if it will reboot and UNLOCK.
Roxysploit
⭐
14
A Hackers framework
Attack Graph Generator
⭐
13
Interview_tips
⭐
12
Summary of Cyber Security interview questions I have been through, hope this helps
Roca
⭐
12
A Sage implementation of the ROCA attack
Improving Your Penetration Testing Skills
⭐
12
Strengthen your defense against web attacks with Kali Linux and Metasploit
Troopers19
⭐
11
All the content from my Troopers 19 talk
Avwa
⭐
10
Advanced Vulnerable Web Application (AVWA)
Node Security Checklist
⭐
10
node.js server security checklist
Vulnerabilities
⭐
9
Vulnerability teaching showcase
Vulnwebcollection
⭐
9
Web attack vectors collection
Node Shield
⭐
8
Protects against common Node.js vulnerabilities in MEAN stack (MongoDB, Node.js).
Vulnerability Testing Solutions
⭐
8
Website for testing and preventing different attacks like XSS, SQL Injection & Spoofing for Nasscom (ISAA) Project.
Waf Benchmark
⭐
7
Web Application Firewall Benchmark
Broken Web Application
⭐
7
An intentionally vulnerable Web-Application based on OWASP 2013 Top 10 List.
Heartbleed
⭐
7
Heartbleed vulnerability exploited 🩸
Struts2vuls
⭐
6
Struts2系列漏洞
Webhacking
⭐
6
Wapiti 3.0.0
⭐
6
Wapiti 3.0.0 - The Web-Application Vulnerability Scanner
Buffer Overflow
⭐
6
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
Grabber Security And Vulnerability Analysis
⭐
6
Ssl
⭐
6
Rules that relate to checking the SSL configuration of each individual resolved server from the domain to ensure locked down config with the broadest compatibility
Spectre_meltdown
⭐
6
Meltdown and Spectre : CPU vulnerabilities — Explained and Exploited
Host Header Attack Test
⭐
6
A simple code for detects Host header vulnerability
Web Security Common Vulnerabilities And Their Mitigation
⭐
6
Code Repository for Web Security: Common Vulnerabilities And Their Mitigation, published by Packt
Ros2 Sectest
⭐
5
ROS2 package that demonstrates ways to exploit vulnerabilities in ROS systems.
Java Secure App
⭐
5
Reduce Private Key
⭐
5
Reducing the private key through scalar multiplication using the ECPy + Google Colab library
Pwnchrome
⭐
5
A small program that grabs saved passwords from Chrome using a vulnerability where saved passwords are vulnerable to attacks/grabs when Chrome is closed.
Vulnerability And Attack Injector
⭐
5
Vulnerability and Attack Injector
Stopinjection
⭐
5
A project and static analysis codebase designed to educate and help prevent malicious attacks on PHP applications.
Iot Securitychecker
⭐
5
IoT Security Checker is a framework for automating some IoT-related security checks
Cve 2018 12018
⭐
5
EPoD (Ethereum Packet of Death)
Stay Home Ctf 2020
⭐
5
C4T BuT S4D Attack-Defence CTF
Related Searches
Security Vulnerabilities (12,350)
Laravel Vulnerabilities (11,319)
Php Vulnerabilities (8,887)
Python Attack (2,303)
Javascript Vulnerabilities (1,306)
Python Vulnerabilities (1,159)
Vulnerabilities Scanner (695)
Javascript Attack (693)
Vulnerabilities Exploitation (636)
Attack Adversarial (590)
1-49 of 49 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.