All Projects → Pywsus → Similar Projects or Alternatives

100 Open source projects that are alternatives of or similar to Pywsus

Python-Botnet
This is a simple DDoS python botnet script with remote monitoring & management for education purposes.
Stars: ✭ 119 (+41.67%)
Mutual labels:  attack
Pentest-Bookmarkz
A collection of useful links for Pentesters
Stars: ✭ 118 (+40.48%)
Mutual labels:  attack
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+451.19%)
Mutual labels:  attack
mitre-visualizer
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (-41.67%)
Mutual labels:  attack
WPCracker
WordPress pentest tool
Stars: ✭ 34 (-59.52%)
Mutual labels:  attack
Singularity
A DNS rebinding attack framework.
Stars: ✭ 621 (+639.29%)
Mutual labels:  attack
RayS
RayS: A Ray Searching Method for Hard-label Adversarial Attack (KDD2020)
Stars: ✭ 43 (-48.81%)
Mutual labels:  attack
Wi Pwn
ESP8266 Deauther ​with a material design WebUI 📶
Stars: ✭ 839 (+898.81%)
Mutual labels:  attack
sgx-tutorial-space18
Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Stars: ✭ 44 (-47.62%)
Mutual labels:  attack
Duckhunt
🎯 Prevent RubberDucky (or other keystroke injection) attacks
Stars: ✭ 386 (+359.52%)
Mutual labels:  attack
rpl-attacks
RPL attacks framework for simulating WSN with a malicious mote based on Contiki
Stars: ✭ 56 (-33.33%)
Mutual labels:  attack
byeintegrity3-uac
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-71.43%)
Mutual labels:  attack
Evilurl
Generate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+678.57%)
Mutual labels:  attack
dawgmon
dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
Stars: ✭ 52 (-38.1%)
Mutual labels:  attack
Arpspoof
arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-52.38%)
Mutual labels:  attack
Kali-Linux-Tools-Interface
Graphical Web interface developed to facilitate the use of security information tools.
Stars: ✭ 169 (+101.19%)
Mutual labels:  attack
Impulse
💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+540.48%)
Mutual labels:  attack
Pummel
Socks5 Proxy HTTP/HTTPS-Flooding (cc) attack
Stars: ✭ 53 (-36.9%)
Mutual labels:  attack
Ska
Simple Karma Attack
Stars: ✭ 55 (-34.52%)
Mutual labels:  attack
attack-stix-data
STIX data representing MITRE ATT&CK
Stars: ✭ 118 (+40.48%)
Mutual labels:  attack
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+391.67%)
Mutual labels:  attack
DNS-Fender
A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (-44.05%)
Mutual labels:  attack
Tcp Connection Hijack Reset
Simple scapy-based tool to hijack and reset existing TCP connections
Stars: ✭ 17 (-79.76%)
Mutual labels:  attack
jpeg-defense
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (-2.38%)
Mutual labels:  attack
Ssrf vulnerable lab
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (+329.76%)
Mutual labels:  attack
T3
[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
Stars: ✭ 25 (-70.24%)
Mutual labels:  attack
dos-attack
The program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
Stars: ✭ 28 (-66.67%)
Mutual labels:  attack
Autordpwn
The Shadow Attack Framework
Stars: ✭ 688 (+719.05%)
Mutual labels:  attack
iyov
Web proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
Stars: ✭ 27 (-67.86%)
Mutual labels:  attack
Timeless Timing Attacks
A Python implementation that facilitates finding timeless timing attack vulnerabilities.
Stars: ✭ 45 (-46.43%)
Mutual labels:  attack
xssmap
Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Stars: ✭ 107 (+27.38%)
Mutual labels:  attack
Dhcpwn
All your IPs are belong to us.
Stars: ✭ 642 (+664.29%)
Mutual labels:  attack
instahack
Hack instagram bruteforce new
Stars: ✭ 23 (-72.62%)
Mutual labels:  attack
Ctfsubmitter
A flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-33.33%)
Mutual labels:  attack
LOLBAS222
APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 100 (+19.05%)
Mutual labels:  attack
Esp8266 beaconspam
Creates up to a thousand WiFi access points with custom SSIDs.
Stars: ✭ 575 (+584.52%)
Mutual labels:  attack
HIDAAF
Python - Human Interface Device Android Attack Framework
Stars: ✭ 31 (-63.1%)
Mutual labels:  attack
Curl Collisions
An implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-76.19%)
Mutual labels:  attack
ddos
DDoS Attack & Protection Tools for Windows, Linux & Android
Stars: ✭ 84 (+0%)
Mutual labels:  attack
Buy pig plan
电话攻击(电话轰炸、可代替短信轰炸)、留言攻击工具 | 已删库
Stars: ✭ 506 (+502.38%)
Mutual labels:  attack
rc4md5cry
rc4md5cry: denial of service for rc4-md5 shadowsocks nodes (shadowboom paper is pending)
Stars: ✭ 15 (-82.14%)
Mutual labels:  attack
Esp8266 deauther
Affordable WiFi hacking platform for testing and learning
Stars: ✭ 9,312 (+10985.71%)
Mutual labels:  attack
byeintegrity5-uac
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Stars: ✭ 21 (-75%)
Mutual labels:  attack
Bitcracker
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (+451.19%)
Mutual labels:  attack
icestick-lpc-tpm-sniffer
FPGA-based LPC bus sniffing tool for Lattice iCEstick Evaluation Kit
Stars: ✭ 41 (-51.19%)
Mutual labels:  attack
Physics Command
Physics platform is a tool for hardware systems (e.g: raspberryPi 3B ). It retrieves data passing through the network and sends it to a control panel. It works the same way as a botnet by receiving remote commands. (you can imagine that as a black box)
Stars: ✭ 23 (-72.62%)
Mutual labels:  attack
TIGER
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (+22.62%)
Mutual labels:  attack
Deauthdetector
Detect deauthentication frames using an ESP8266
Stars: ✭ 406 (+383.33%)
Mutual labels:  attack
refluxion
Refluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-70.24%)
Mutual labels:  attack
Mhddos
Best DDoS Attack Script Python3, Cyber Attack With 36 Method
Stars: ✭ 55 (-34.52%)
Mutual labels:  attack
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (-10.71%)
Mutual labels:  attack
Awesome Cybersecurity Datasets
A curated list of amazingly awesome Cybersecurity datasets
Stars: ✭ 380 (+352.38%)
Mutual labels:  attack
hayabusa
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+980.95%)
Mutual labels:  attack
Cti
Cyber Threat Intelligence Repository expressed in STIX 2.0
Stars: ✭ 822 (+878.57%)
Mutual labels:  attack
Fluxion
Fluxion is a remake of linset by vk496 with enhanced functionality.
Stars: ✭ 3,275 (+3798.81%)
Mutual labels:  attack
Apt
APT || Execution || Launch || APTs || ( Authors harr0ey, bohops )
Stars: ✭ 83 (-1.19%)
Mutual labels:  attack
Google Chinese Handwriting Ime
Written in Electron for Linux.
Stars: ✭ 58 (-30.95%)
Mutual labels:  attack
Eddsa Fault Attack
Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Stars: ✭ 53 (-36.9%)
Mutual labels:  attack
Emagnet
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (+719.05%)
Mutual labels:  attack
Mr.sip
SIP-Based Audit and Attack Tool
Stars: ✭ 266 (+216.67%)
Mutual labels:  attack
1-60 of 100 similar projects