Free adv trainOfficial TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Stars: ✭ 127 (-25.73%)
Robust Tube MpcRobust model predictive control using tube
Stars: ✭ 83 (-51.46%)
CtiCyber Threat Intelligence Repository expressed in STIX 2.0
Stars: ✭ 822 (+380.7%)
Esp8266 beaconspamCreates up to a thousand WiFi access points with custom SSIDs.
Stars: ✭ 575 (+236.26%)
PolysnapA work in progress polygon operations library with integer snap-rounding
Stars: ✭ 14 (-91.81%)
EvilurlGenerate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+282.46%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-33.33%)
CtfsubmitterA flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-67.25%)
ChimeraChimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+170.76%)
DeauthdetectorDetect deauthentication frames using an ESP8266
Stars: ✭ 406 (+137.43%)
AltairLightweight and Robust API Gateway written in Go
Stars: ✭ 34 (-80.12%)
DeautherdroidAdditional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (-45.61%)
Physics CommandPhysics platform is a tool for hardware systems (e.g: raspberryPi 3B ). It retrieves data passing through the network and sends it to a control panel. It works the same way as a botnet by receiving remote commands. (you can imagine that as a black box)
Stars: ✭ 23 (-86.55%)
AutordpwnThe Shadow Attack Framework
Stars: ✭ 688 (+302.34%)
PywsusStandalone implementation of a part of the WSUS spec. Built for offensive security purposes.
Stars: ✭ 84 (-50.88%)
SingularityA DNS rebinding attack framework.
Stars: ✭ 621 (+263.16%)
WreckuestsYet another one hard-hitting tool to run HTTP stress tests 🌌
Stars: ✭ 137 (-19.88%)
Buy pig plan电话攻击(电话轰炸、可代替短信轰炸)、留言攻击工具 | 已删库
Stars: ✭ 506 (+195.91%)
Esp8266 deautherAffordable WiFi hacking platform for testing and learning
Stars: ✭ 9,312 (+5345.61%)
Hackinghacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+141.52%)
Conserve[beta] robust portable backup tool in Rust
Stars: ✭ 107 (-37.43%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-67.84%)
React Bolt⚡ The most simple & robust boilerplate for your React projects.
Stars: ✭ 298 (+74.27%)
Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-76.61%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (-39.77%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-88.3%)
DasynqThread-safe cross-platform event loop library in C++
Stars: ✭ 127 (-25.73%)
Wi PwnESP8266 Deauther with a material design WebUI 📶
Stars: ✭ 839 (+390.64%)
Wifi Spam✉️📡 Spam thousands of WiFi access points with custom SSIDs
Stars: ✭ 92 (-46.2%)
StatsexpressionsExpressions and dataframes with statistical details 📉 📜🔣✅
Stars: ✭ 144 (-15.79%)
FluxionFluxion is a remake of linset by vk496 with enhanced functionality.
Stars: ✭ 3,275 (+1815.2%)
EmagnetAutomated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (+302.34%)
Pax💀 🔓 CLI tool for PKCS7 padding oracle attacks
Stars: ✭ 90 (-47.37%)
JlscaSide-channel toolkit in Julia
Stars: ✭ 114 (-33.33%)
DhcpwnAll your IPs are belong to us.
Stars: ✭ 642 (+275.44%)
AptAPT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (-51.46%)
Sdkhotfix在用户规模千万级别的app中验证过,稳定无兼容问题,5分钟让你的SDK拥有热修复能力。A SDK hotfix library with stable verified in tens of millions of users can be accessed in only five minutes.
Stars: ✭ 585 (+242.11%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (-18.71%)
Impulse💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+214.62%)
RhodiumPython Library for Robust Decision Making and Exploratory Modelling
Stars: ✭ 77 (-54.97%)
Browser🌍 Take back your privacy with Dot Browser, the privacy-conscious web browser that protects you from being tracked and monitored online.
Stars: ✭ 475 (+177.78%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-34.5%)
BitcrackerBitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (+170.76%)
RobustRobust is an Android HotFix solution with high compatibility and high stability. Robust can fix bugs immediately without a reboot.
Stars: ✭ 4,125 (+2312.28%)
Kube Aws Iam ControllerDistribute different AWS IAM credentials to different pods in Kubernetes via secrets.
Stars: ✭ 137 (-19.88%)
Duckhunt🎯 Prevent RubberDucky (or other keystroke injection) attacks
Stars: ✭ 386 (+125.73%)
SkaSimple Karma Attack
Stars: ✭ 55 (-67.84%)
Ssrf vulnerable labThis Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (+111.11%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+5942.69%)
Eddsa Fault AttackFault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Stars: ✭ 53 (-69.01%)
AtomicpurpleteamAtomic Purple Team Framework and Lifecycle
Stars: ✭ 155 (-9.36%)
Cc AttackUsing Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
Stars: ✭ 145 (-15.2%)
Timeless Timing AttacksA Python implementation that facilitates finding timeless timing attack vulnerabilities.
Stars: ✭ 45 (-73.68%)