DNS-FenderA Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (-94.28%)
dawgmondawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
Stars: ✭ 52 (-93.67%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (-82.73%)
rpl-attacksRPL attacks framework for simulating WSN with a malicious mote based on Contiki
Stars: ✭ 56 (-93.19%)
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-90.02%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-49.76%)
Cheat-Sheet---Active-DirectoryThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: ✭ 154 (-81.27%)
Kali-Linux-Tools-InterfaceGraphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (-79.44%)
IntruderpayloadsA collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+238.08%)
Mr.sipSIP-Based Audit and Attack Tool
Stars: ✭ 266 (-67.64%)
sgx-tutorial-space18Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Stars: ✭ 44 (-94.65%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (-43.67%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-95.86%)
mitre-visualizer🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (-94.04%)
byeintegrity3-uacBypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-97.08%)
SingularityA DNS rebinding attack framework.
Stars: ✭ 621 (-24.45%)
deautherAn interactive command-line deauther for macOS.
Stars: ✭ 70 (-91.48%)
Python-BotnetThis is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (-85.52%)
spectre-attack-demoReproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Stars: ✭ 87 (-89.42%)
Duckhunt🎯 Prevent RubberDucky (or other keystroke injection) attacks
Stars: ✭ 386 (-53.04%)
RaySRayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
Stars: ✭ 43 (-94.77%)
rc4md5cryrc4md5cry: denial of service for rc4-md5 shadowsocks nodes (shadowboom paper is pending)
Stars: ✭ 15 (-98.18%)
Hfish安全、可靠、简单、免费的企业级蜜罐
Stars: ✭ 2,977 (+262.17%)
FluxionFluxion is a remake of linset by vk496 with enhanced functionality.
Stars: ✭ 3,275 (+298.42%)
byeintegrity5-uacBypass UAC at any level by abusing the Task Scheduler and environment variables
Stars: ✭ 21 (-97.45%)
Buy pig plan电话攻击(电话轰炸、可代替短信轰炸)、留言攻击工具 | 已删库
Stars: ✭ 506 (-38.44%)
T3[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
Stars: ✭ 25 (-96.96%)
TIGERPython toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (-87.47%)
DhcpwnAll your IPs are belong to us.
Stars: ✭ 642 (-21.9%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-96.96%)
iyovWeb proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
Stars: ✭ 27 (-96.72%)
BitcrackerBitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (-43.67%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+10.46%)
xssmapIntelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (-86.98%)
dos-attackThe program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
Stars: ✭ 28 (-96.59%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (-16.3%)
byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (-94.4%)
instahackHack instagram bruteforce new
Stars: ✭ 23 (-97.2%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (-17.76%)
DeauthdetectorDetect deauthentication frames using an ESP8266
Stars: ✭ 406 (-50.61%)
CCATK高度自动化CC脚本
Stars: ✭ 107 (-86.98%)
LOLBAS222APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 100 (-87.83%)
assapAnti Shoulder Surfing Attack Platform (ASSAP)
Stars: ✭ 22 (-97.32%)
Esp8266 beaconspamCreates up to a thousand WiFi access points with custom SSIDs.
Stars: ✭ 575 (-30.05%)
MitmMan in the middle tool
Stars: ✭ 30 (-96.35%)
HIDAAFPython - Human Interface Device Android Attack Framework
Stars: ✭ 31 (-96.23%)
ArmorArmor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (-72.26%)
ddosDDoS Attack & Protection Tools for Windows, Linux & Android
Stars: ✭ 84 (-89.78%)
EmagnetAutomated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (-16.3%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (-20.44%)
Impulse💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (-34.55%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (-56.08%)
PummelSocks5 Proxy HTTP/HTTPS-Flooding (cc) attack
Stars: ✭ 53 (-93.55%)