dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-71.94%)
PummelSocks5 Proxy HTTP/HTTPS-Flooding (cc) attack
Stars: ✭ 53 (-89.53%)
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-83.79%)
Kali-Linux-Tools-InterfaceGraphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (-66.6%)
Cheat-Sheet---Active-DirectoryThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: ✭ 154 (-69.57%)
rpl-attacksRPL attacks framework for simulating WSN with a malicious mote based on Contiki
Stars: ✭ 56 (-88.93%)
IntruderpayloadsA collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+449.21%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-93.28%)
Python-BotnetThis is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (-76.48%)
byeintegrity3-uacBypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-95.26%)
Mr.sipSIP-Based Audit and Attack Tool
Stars: ✭ 266 (-47.43%)
deautherAn interactive command-line deauther for macOS.
Stars: ✭ 70 (-86.17%)
RaySRayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
Stars: ✭ 43 (-91.5%)
spectre-attack-demoReproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Stars: ✭ 87 (-82.81%)
Duckhunt🎯 Prevent RubberDucky (or other keystroke injection) attacks
Stars: ✭ 386 (-23.72%)
ArduinoarpspoofKicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.
Stars: ✭ 215 (-57.51%)
mitre-visualizer🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (-90.32%)
CamerattackAn attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Stars: ✭ 192 (-62.06%)
sgx-tutorial-space18Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Stars: ✭ 44 (-91.3%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-95.06%)
BkcrackCrack legacy zip encryption with Biham and Kocher's known plaintext attack.
Stars: ✭ 178 (-64.82%)
instahackHack instagram bruteforce new
Stars: ✭ 23 (-95.45%)
FluxionFluxion is a remake of linset by vk496 with enhanced functionality.
Stars: ✭ 3,275 (+547.23%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+79.45%)
LOLBAS222APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 100 (-80.24%)
dos-attackThe program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
Stars: ✭ 28 (-94.47%)
DeauthdetectorDetect deauthentication frames using an ESP8266
Stars: ✭ 406 (-19.76%)
byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (-90.91%)
HIDAAFPython - Human Interface Device Android Attack Framework
Stars: ✭ 31 (-93.87%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+33.6%)
T3[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
Stars: ✭ 25 (-95.06%)
CCATK高度自动化CC脚本
Stars: ✭ 107 (-78.85%)
ddosDDoS Attack & Protection Tools for Windows, Linux & Android
Stars: ✭ 84 (-83.4%)
assapAnti Shoulder Surfing Attack Platform (ASSAP)
Stars: ✭ 22 (-95.65%)
BitcrackerBitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (-8.5%)
MitmMan in the middle tool
Stars: ✭ 30 (-94.07%)
rc4md5cryrc4md5cry: denial of service for rc4-md5 shadowsocks nodes (shadowboom paper is pending)
Stars: ✭ 15 (-97.04%)
ArmorArmor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (-54.94%)
iyovWeb proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
Stars: ✭ 27 (-94.66%)
Hfish安全、可靠、简单、免费的企业级蜜罐
Stars: ✭ 2,977 (+488.34%)
byeintegrity5-uacBypass UAC at any level by abusing the Task Scheduler and environment variables
Stars: ✭ 21 (-95.85%)
Hiddeneye LegacyModern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
Stars: ✭ 2,568 (+407.51%)
SnmpwnAn SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (-63.83%)
xssmapIntelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (-78.85%)
TIGERPython toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (-79.64%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (-8.5%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-18.38%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-28.66%)
dawgmondawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
Stars: ✭ 52 (-89.72%)
DNS-FenderA Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (-90.71%)