IntruderpayloadsA collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+2987.78%)
Hfish安全、可靠、简单、免费的企业级蜜罐
Stars: ✭ 2,977 (+3207.78%)
ArduinoarpspoofKicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.
Stars: ✭ 215 (+138.89%)
Hiddeneye LegacyModern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
Stars: ✭ 2,568 (+2753.33%)
CamerattackAn attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Stars: ✭ 192 (+113.33%)
SnmpwnAn SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (+103.33%)
BkcrackCrack legacy zip encryption with Biham and Kocher's known plaintext attack.
Stars: ✭ 178 (+97.78%)
Adversarial Robustness ToolboxAdversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+2831.11%)
KillchainA unified console to perform the "kill chain" stages of attacks.
Stars: ✭ 172 (+91.11%)
DiffaiA certifiable defense against adversarial examples by training neural networks to be provably robust
Stars: ✭ 171 (+90%)
AtomicpurpleteamAtomic Purple Team Framework and Lifecycle
Stars: ✭ 155 (+72.22%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (+54.44%)
Cc AttackUsing Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
Stars: ✭ 145 (+61.11%)
WreckuestsYet another one hard-hitting tool to run HTTP stress tests 🌌
Stars: ✭ 137 (+52.22%)
Free adv trainOfficial TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Stars: ✭ 127 (+41.11%)
JlscaSide-channel toolkit in Julia
Stars: ✭ 114 (+26.67%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (+26.67%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (+24.44%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+11381.11%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (+14.44%)
DeautherdroidAdditional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (+3.33%)
Wifi Spam✉️📡 Spam thousands of WiFi access points with custom SSIDs
Stars: ✭ 92 (+2.22%)
Node OracledbOracle Database driver for Node.js maintained by Oracle Corp.
Stars: ✭ 2,018 (+2142.22%)