byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (+91.67%)
byeintegrity5-uacBypass UAC at any level by abusing the Task Scheduler and environment variables
Stars: ✭ 21 (-12.5%)
go-escalateThe goal is to provide an easy to use API to escalate privileges on Linux, Windows and Mac OS
Stars: ✭ 23 (-4.17%)
BrahmaBrahma - Privilege elevation exploit for Nintendo 3DS
Stars: ✭ 34 (+41.67%)
Infosec referenceAn Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+17241.67%)
IntruderpayloadsA collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+11479.17%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (+366.67%)
DeautherdroidAdditional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (+287.5%)
OrcaAdvanced Malware with multifeatures written in ASM/C/C++ , work on all windows versions ! (uncompleted)
Stars: ✭ 184 (+666.67%)
Hiddeneye LegacyModern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
Stars: ✭ 2,568 (+10600%)
AptAPT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (+245.83%)
Cc AttackUsing Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
Stars: ✭ 145 (+504.17%)
JlscaSide-channel toolkit in Julia
Stars: ✭ 114 (+375%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (+375%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+42954.17%)
Pax💀 🔓 CLI tool for PKCS7 padding oracle attacks
Stars: ✭ 90 (+275%)
deautherAn interactive command-line deauther for macOS.
Stars: ✭ 70 (+191.67%)
SnmpwnAn SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (+662.5%)
SkaSimple Karma Attack
Stars: ✭ 55 (+129.17%)
Eddsa Fault AttackFault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Stars: ✭ 53 (+120.83%)
assapAnti Shoulder Surfing Attack Platform (ASSAP)
Stars: ✭ 22 (-8.33%)
BkcrackCrack legacy zip encryption with Biham and Kocher's known plaintext attack.
Stars: ✭ 178 (+641.67%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (+66.67%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (+479.17%)
MitmMan in the middle tool
Stars: ✭ 30 (+25%)
WreckuestsYet another one hard-hitting tool to run HTTP stress tests 🌌
Stars: ✭ 137 (+470.83%)
CCATK高度自动化CC脚本
Stars: ✭ 107 (+345.83%)
Free adv trainOfficial TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Stars: ✭ 127 (+429.17%)
ArmorArmor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (+850%)
ArduinoarpspoofKicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.
Stars: ✭ 215 (+795.83%)
Wi PwnESP8266 Deauther with a material design WebUI 📶
Stars: ✭ 839 (+3395.83%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (+329.17%)
PSeudoExecute PowerShell commands as Administrator in Windows 10 "like sudo"
Stars: ✭ 32 (+33.33%)
Wifi Spam✉️📡 Spam thousands of WiFi access points with custom SSIDs
Stars: ✭ 92 (+283.33%)
PywsusStandalone implementation of a part of the WSUS spec. Built for offensive security purposes.
Stars: ✭ 84 (+250%)
Esp8266 deautherAffordable WiFi hacking platform for testing and learning
Stars: ✭ 9,312 (+38700%)
CamerattackAn attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Stars: ✭ 192 (+700%)
CtfsubmitterA flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (+133.33%)
spectre-attack-demoReproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Stars: ✭ 87 (+262.5%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (+129.17%)
Timeless Timing AttacksA Python implementation that facilitates finding timeless timing attack vulnerabilities.
Stars: ✭ 45 (+87.5%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+2716.67%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-16.67%)
Adversarial Robustness ToolboxAdversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+10891.67%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+491.67%)
Physics CommandPhysics platform is a tool for hardware systems (e.g: raspberryPi 3B ). It retrieves data passing through the network and sends it to a control panel. It works the same way as a botnet by receiving remote commands. (you can imagine that as a black box)
Stars: ✭ 23 (-4.17%)
KillchainA unified console to perform the "kill chain" stages of attacks.
Stars: ✭ 172 (+616.67%)
CtiCyber Threat Intelligence Repository expressed in STIX 2.0
Stars: ✭ 822 (+3325%)
DiffaiA certifiable defense against adversarial examples by training neural networks to be provably robust
Stars: ✭ 171 (+612.5%)
dos-attackThe program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
Stars: ✭ 28 (+16.67%)