Arpspoof arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-64.91%)
1833718.337 - Parallel Computing and Scientific Machine Learning
Stars: ✭ 834 (+631.58%)
ParamgmtA parallel SSH-based remote machine management system
Stars: ✭ 80 (-29.82%)
IndiumA JavaScript development environment for Emacs
Stars: ✭ 1,058 (+828.07%)
Fucking Java Concurrency🎏 Simple show cases of java concurrency problems, seeing 🙈 is believing 🐵
Stars: ✭ 779 (+583.33%)
ImminentA composable Futures library for Clojure
Stars: ✭ 88 (-22.81%)
Curl CollisionsAn implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-82.46%)
Func LocA simple tool that helps you to retrieve the function location from its reference.
Stars: ✭ 99 (-13.16%)
EdgeExtreme-scale Discontinuous Galerkin Environment (EDGE)
Stars: ✭ 18 (-84.21%)
MhddosBest DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-51.75%)
DiveA tool for exploring each layer in a docker image
Stars: ✭ 28,957 (+25300.88%)
LibceedCEED Library: Code for Efficient Extensible Discretizations
Stars: ✭ 90 (-21.05%)
Timeless Timing AttacksA Python implementation that facilitates finding timeless timing attack vulnerabilities.
Stars: ✭ 45 (-60.53%)
NasoqNASOQ:Numerically Accurate Sparsity Oriented QP Solver
Stars: ✭ 30 (-73.68%)
PywsusStandalone implementation of a part of the WSUS spec. Built for offensive security purposes.
Stars: ✭ 84 (-26.32%)
AtmsimulatorUsed the notion of threads and parallelism to make a ATM Simulator.
Stars: ✭ 11 (-90.35%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+8964.04%)
Physics CommandPhysics platform is a tool for hardware systems (e.g: raspberryPi 3B ). It retrieves data passing through the network and sends it to a control panel. It works the same way as a botnet by receiving remote commands. (you can imagine that as a black box)
Stars: ✭ 23 (-79.82%)
Mads.jlMADS: Model Analysis & Decision Support
Stars: ✭ 71 (-37.72%)
CtiCyber Threat Intelligence Repository expressed in STIX 2.0
Stars: ✭ 822 (+621.05%)
BoincOpen-source software for volunteer computing and grid computing.
Stars: ✭ 1,320 (+1057.89%)
KokkosKokkos C++ Performance Portability Programming EcoSystem: The Programming Model - Parallel Execution and Memory Abstraction
Stars: ✭ 744 (+552.63%)
GeopmGlobal Extensible Open Power Manager
Stars: ✭ 57 (-50%)
SkaSimple Karma Attack
Stars: ✭ 55 (-51.75%)
EmagnetAutomated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (+503.51%)
DrakeAn R-focused pipeline toolkit for reproducibility and high-performance computing
Stars: ✭ 1,301 (+1041.23%)
Eddsa Fault AttackFault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Stars: ✭ 53 (-53.51%)
ClustermqR package to send function calls as jobs on LSF, SGE, Slurm, PBS/Torque, or each via SSH
Stars: ✭ 106 (-7.02%)
PhobosThe standard library of the D programming language
Stars: ✭ 1,038 (+810.53%)
Pax💀 🔓 CLI tool for PKCS7 padding oracle attacks
Stars: ✭ 90 (-21.05%)
Ensembl HiveEnsEMBL Hive - a system for creating and running pipelines on a distributed compute resource
Stars: ✭ 44 (-61.4%)
ChocolateA fully decentralized hyperparameter optimization framework
Stars: ✭ 112 (-1.75%)
React Inspect PropsReact properties inspector with the power of Redux DevTools
Stars: ✭ 31 (-72.81%)
InfinityA lightweight C++ RDMA library for InfiniBand networks.
Stars: ✭ 86 (-24.56%)
ColdfrontHPC Resource Allocation System
Stars: ✭ 28 (-75.44%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (-9.65%)
BlisBLAS-like Library Instantiation Software Framework
Stars: ✭ 859 (+653.51%)
AptAPT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (-27.19%)
Wi PwnESP8266 Deauther with a material design WebUI 📶
Stars: ✭ 839 (+635.96%)
CompositeA component-based OS
Stars: ✭ 113 (-0.88%)
NeanderthalFast Clojure Matrix Library
Stars: ✭ 927 (+713.16%)
CekirdeklerMulti-device OpenCL kernel load balancer and pipeliner API for C#. Uses shared-distributed memory model to keep GPUs updated fast while using same kernel on all devices(for simplicity).
Stars: ✭ 76 (-33.33%)
UinspectorA UI inspector to traverse a view hierarchy on Android
Stars: ✭ 97 (-14.91%)
Esp8266 deautherAffordable WiFi hacking platform for testing and learning
Stars: ✭ 9,312 (+8068.42%)
ArraymancerA fast, ergonomic and portable tensor library in Nim with a deep learning focus for CPU, GPU and embedded devices via OpenMP, Cuda and OpenCL backends
Stars: ✭ 793 (+595.61%)
WuzzInteractive cli tool for HTTP inspection
Stars: ✭ 9,845 (+8535.96%)
InspectorA drop-anywhere C++ REPL
Stars: ✭ 767 (+572.81%)
LoggerSimple logger with stores inspector
Stars: ✭ 58 (-49.12%)
Syntax sugar pythonA library adding some anti-Pythonic syntatic sugar to Python
Stars: ✭ 721 (+532.46%)
DeautherdroidAdditional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (-18.42%)
Drake ExamplesExample workflows for the drake R package
Stars: ✭ 57 (-50%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (+0%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (-1.75%)
DaceDaCe - Data Centric Parallel Programming
Stars: ✭ 106 (-7.02%)
Wifi Spam✉️📡 Spam thousands of WiFi access points with custom SSIDs
Stars: ✭ 92 (-19.3%)
CtfsubmitterA flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-50.88%)