T3[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
rpl-attacksRPL attacks framework for simulating WSN with a malicious mote based on Contiki
iyovWeb proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
mitre-visualizer🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
xssmapIntelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
dawgmondawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
Python-BotnetThis is a simple DDoS python botnet script with remote monitoring & management for education purposes.
LOLBAS222APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
HIDAAFPython - Human Interface Device Android Attack Framework
RaySRayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
ddosDDoS Attack & Protection Tools for Windows, Linux & Android
PummelSocks5 Proxy HTTP/HTTPS-Flooding (cc) attack
rc4md5cryrc4md5cry: denial of service for rc4-md5 shadowsocks nodes (shadowboom paper is pending)
byeintegrity5-uacBypass UAC at any level by abusing the Task Scheduler and environment variables
TIGERPython toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
DNS-FenderA Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
byeintegrity3-uacBypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
dos-attackThe program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
deautherAn interactive command-line deauther for macOS.
ThePhishThePhish: an automated phishing email analysis tool
Cheat-Sheet---Active-DirectoryThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
spectre-attack-demoReproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
assapAnti Shoulder Surfing Attack Platform (ASSAP)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
MitmMan in the middle tool