All Projects → Buy_pig_plan → Similar Projects or Alternatives

100 Open source projects that are alternatives of or similar to Buy_pig_plan

Z0172CK-Tools
Hacking Tools Z0172CK
Stars: ✭ 31 (-93.87%)
Mutual labels:  attack
dheater
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-71.94%)
Mutual labels:  attack
Pummel
Socks5 Proxy HTTP/HTTPS-Flooding (cc) attack
Stars: ✭ 53 (-89.53%)
Mutual labels:  attack
jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-83.79%)
Mutual labels:  attack
Padding Oracle Attack
🔓 Padding oracle attack against PKCS7 🔓
Stars: ✭ 209 (-58.7%)
Mutual labels:  attack
Kali-Linux-Tools-Interface
Graphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (-66.6%)
Mutual labels:  attack
Cheat-Sheet---Active-Directory
This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: ✭ 154 (-69.57%)
Mutual labels:  attack
rpl-attacks
RPL attacks framework for simulating WSN with a malicious mote based on Contiki
Stars: ✭ 56 (-88.93%)
Mutual labels:  attack
Intruderpayloads
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+449.21%)
Mutual labels:  attack
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (-76.68%)
Mutual labels:  attack
WPCracker
WordPress pentest tool
Stars: ✭ 34 (-93.28%)
Mutual labels:  attack
Attack Defense Framework
🚩 A framework for CTF Attack with Defense Mode
Stars: ✭ 183 (-63.83%)
Mutual labels:  attack
Python-Botnet
This is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (-76.48%)
Mutual labels:  attack
byeintegrity3-uac
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-95.26%)
Mutual labels:  attack
Mr.sip
SIP-Based Audit and Attack Tool
Stars: ✭ 266 (-47.43%)
Mutual labels:  attack
deauther
An interactive command-line deauther for macOS.
Stars: ✭ 70 (-86.17%)
Mutual labels:  attack
RayS
RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
Stars: ✭ 43 (-91.5%)
Mutual labels:  attack
spectre-attack-demo
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Stars: ✭ 87 (-82.81%)
Mutual labels:  attack
Duckhunt
🎯 Prevent RubberDucky (or other keystroke injection) attacks
Stars: ✭ 386 (-23.72%)
Mutual labels:  attack
md5-extension-attack
MD5长度扩展攻击
Stars: ✭ 36 (-92.89%)
Mutual labels:  attack
Pentest-Bookmarkz
A collection of useful links for Pentesters
Stars: ✭ 118 (-76.68%)
Mutual labels:  attack
Arduinoarpspoof
Kicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.
Stars: ✭ 215 (-57.51%)
Mutual labels:  attack
mitre-visualizer
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (-90.32%)
Mutual labels:  attack
Camerattack
An attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Stars: ✭ 192 (-62.06%)
Mutual labels:  attack
sgx-tutorial-space18
Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Stars: ✭ 44 (-91.3%)
Mutual labels:  attack
refluxion
Refluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-95.06%)
Mutual labels:  attack
Bkcrack
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Stars: ✭ 178 (-64.82%)
Mutual labels:  attack
instahack
Hack instagram bruteforce new
Stars: ✭ 23 (-95.45%)
Mutual labels:  attack
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-85.18%)
Mutual labels:  attack
Fluxion
Fluxion is a remake of linset by vk496 with enhanced functionality.
Stars: ✭ 3,275 (+547.23%)
Mutual labels:  attack
hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+79.45%)
Mutual labels:  attack
LOLBAS222
APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 100 (-80.24%)
Mutual labels:  attack
dos-attack
The program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
Stars: ✭ 28 (-94.47%)
Mutual labels:  attack
Deauthdetector
Detect deauthentication frames using an ESP8266
Stars: ✭ 406 (-19.76%)
Mutual labels:  attack
byeintegrity2-uac
Bypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (-90.91%)
Mutual labels:  attack
HIDAAF
Python - Human Interface Device Android Attack Framework
Stars: ✭ 31 (-93.87%)
Mutual labels:  attack
ThePhish
ThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+33.6%)
Mutual labels:  attack
T3
[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
Stars: ✭ 25 (-95.06%)
Mutual labels:  attack
CCATK
高度自动化CC脚本
Stars: ✭ 107 (-78.85%)
Mutual labels:  attack
ddos
DDoS Attack & Protection Tools for Windows, Linux & Android
Stars: ✭ 84 (-83.4%)
Mutual labels:  attack
assap
Anti Shoulder Surfing Attack Platform (ASSAP)
Stars: ✭ 22 (-95.65%)
Mutual labels:  attack
Bitcracker
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (-8.5%)
Mutual labels:  attack
Mitm
Man in the middle tool
Stars: ✭ 30 (-94.07%)
Mutual labels:  attack
rc4md5cry
rc4md5cry: denial of service for rc4-md5 shadowsocks nodes (shadowboom paper is pending)
Stars: ✭ 15 (-97.04%)
Mutual labels:  attack
Armor
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (-54.94%)
Mutual labels:  attack
iyov
Web proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
Stars: ✭ 27 (-94.66%)
Mutual labels:  attack
Hfish
安全、可靠、简单、免费的企业级蜜罐
Stars: ✭ 2,977 (+488.34%)
Mutual labels:  attack
byeintegrity5-uac
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Stars: ✭ 21 (-95.85%)
Mutual labels:  attack
Spectre Attack Sgx
Spectre attack against SGX enclave
Stars: ✭ 214 (-57.71%)
Mutual labels:  attack
Awesome Cybersecurity Datasets
A curated list of amazingly awesome Cybersecurity datasets
Stars: ✭ 380 (-24.9%)
Mutual labels:  attack
Hiddeneye Legacy
Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
Stars: ✭ 2,568 (+407.51%)
Mutual labels:  attack
icestick-lpc-tpm-sniffer
FPGA-based LPC bus sniffing tool for Lattice iCEstick Evaluation Kit
Stars: ✭ 41 (-91.9%)
Mutual labels:  attack
Snmpwn
An SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (-63.83%)
Mutual labels:  attack
xssmap
Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (-78.85%)
Mutual labels:  attack
TIGER
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (-79.64%)
Mutual labels:  attack
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (-8.5%)
Mutual labels:  attack
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-18.38%)
Mutual labels:  attack
Ssrf vulnerable lab
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-28.66%)
Mutual labels:  attack
dawgmon
dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
Stars: ✭ 52 (-89.72%)
Mutual labels:  attack
DNS-Fender
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (-90.71%)
Mutual labels:  attack
1-60 of 100 similar projects