All Categories → Security → attack

Top 100 attack open source projects

T3
[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
iyov
Web proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
mitre-visualizer
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
xssmap
Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
dawgmon
dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
Python-Botnet
This is a simple DDoS python botnet script with remote monitoring & management for education purposes.
LOLBAS222
APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
HIDAAF
Python - Human Interface Device Android Attack Framework
RayS
RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
ddos
DDoS Attack & Protection Tools for Windows, Linux & Android
rc4md5cry
rc4md5cry: denial of service for rc4-md5 shadowsocks nodes (shadowboom paper is pending)
byeintegrity5-uac
Bypass UAC at any level by abusing the Task Scheduler and environment variables
sgx-tutorial-space18
Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
DNS-Fender
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
byeintegrity3-uac
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
dos-attack
The program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
byeintegrity2-uac
Bypass UAC by abusing the Internet Explorer Add-on installer
deauther
An interactive command-line deauther for macOS.
Cheat-Sheet---Active-Directory
This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
CCATK
高度自动化CC脚本
spectre-attack-demo
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
61-100 of 100 attack projects