inclavare-containersA novel container runtime, aka confidential container, for cloud-native confidential computing and enclave runtime ecosystem.
Stars: ✭ 510 (+1059.09%)
confidential-computing-zooConfidential Computing Zoo provides confidential computing solutions based on Intel SGX, TDX, HEXL, etc. technologies.
Stars: ✭ 177 (+302.27%)
CCATK高度自动化CC脚本
Stars: ✭ 107 (+143.18%)
DiffaiA certifiable defense against adversarial examples by training neural networks to be provably robust
Stars: ✭ 171 (+288.64%)
ArmorArmor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Stars: ✭ 228 (+418.18%)
deautherAn interactive command-line deauther for macOS.
Stars: ✭ 70 (+59.09%)
hayabusaHayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Stars: ✭ 908 (+1963.64%)
WreckuestsYet another one hard-hitting tool to run HTTP stress tests 🌌
Stars: ✭ 137 (+211.36%)
rhme-2016The RHme2 (Riscure Hack me 2) is a low level hardware CTF challenge that comes in the form of an Arduino Nano board. The new edition provides a completely different set of new challenges to test your skills in side channel, fault injection, cryptoanalysis and software exploitation attacks.
Stars: ✭ 42 (-4.55%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (+159.09%)
aws-nitro-enclaves-sdk-cThis repo provides a C API for AWS Nitro Enclaves, including a KMS SDK that integrates it with attestation.
Stars: ✭ 73 (+65.91%)
ArduinoarpspoofKicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.
Stars: ✭ 215 (+388.64%)
opaque-sqlAn encrypted data analytics platform
Stars: ✭ 169 (+284.09%)
CamerattackAn attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Stars: ✭ 192 (+336.36%)
Cheat-Sheet---Active-DirectoryThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Stars: ✭ 154 (+250%)
Adversarial Robustness ToolboxAdversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Stars: ✭ 2,638 (+5895.45%)
refluxionRefluxion -- MITM WPA attacks tool
Stars: ✭ 25 (-43.18%)
InstahackBest Tool For instagram bruteforce hacking Tool By EvilDevil
Stars: ✭ 139 (+215.91%)
spectre-attack-demoReproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Stars: ✭ 87 (+97.73%)
Free adv trainOfficial TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Stars: ✭ 127 (+188.64%)
WifiphisherWifiphisher is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.
Stars: ✭ 10,333 (+23384.09%)
meta-secure-coreOpenEmbedded layer for the use cases on secure boot, integrity and encryption
Stars: ✭ 80 (+81.82%)
Nonce DisrespectNonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
Stars: ✭ 103 (+134.09%)
MitmMan in the middle tool
Stars: ✭ 30 (-31.82%)
crust-sworkersWorker(storage worker) is an offchain storage work inspector of Crust MPoW protocol running inside TEE enclave
Stars: ✭ 30 (-31.82%)
IntruderpayloadsA collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Stars: ✭ 2,779 (+6215.91%)
byeintegrity2-uacBypass UAC by abusing the Internet Explorer Add-on installer
Stars: ✭ 46 (+4.55%)
DNS-FenderA Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native Linux commands, this tool is in development to cripple web servers using spoofed DNS recursive queries.
Stars: ✭ 47 (+6.82%)
Hiddeneye LegacyModern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
Stars: ✭ 2,568 (+5736.36%)
ThePhishThePhish: an automated phishing email analysis tool
Stars: ✭ 676 (+1436.36%)
SnmpwnAn SNMPv3 User Enumerator and Attack tool
Stars: ✭ 183 (+315.91%)
jpeg-defenseSHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Stars: ✭ 82 (+86.36%)
BkcrackCrack legacy zip encryption with Biham and Kocher's known plaintext attack.
Stars: ✭ 178 (+304.55%)
python-sgxPython interface to the SGX SDK
Stars: ✭ 29 (-34.09%)
KillchainA unified console to perform the "kill chain" stages of attacks.
Stars: ✭ 172 (+290.91%)
sidefuzzFuzzer to automatically find side-channel (timing) vulnerabilities
Stars: ✭ 94 (+113.64%)
AtomicpurpleteamAtomic Purple Team Framework and Lifecycle
Stars: ✭ 155 (+252.27%)
cpu-load-side-channelSide-channel file transfer between independent VMs or processes executed on the same physical host.
Stars: ✭ 45 (+2.27%)
Cc AttackUsing Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
Stars: ✭ 145 (+229.55%)
byeintegrity3-uacBypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Stars: ✭ 24 (-45.45%)
jlsca-tutorialsTutorials and examples on how to use Jlsca, the high-performance side channel analysis toolkit written in Julia
Stars: ✭ 43 (-2.27%)
JlscaSide-channel toolkit in Julia
Stars: ✭ 114 (+159.09%)
Misp MaltegoSet of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Stars: ✭ 112 (+154.55%)
dos-attackThe program uses a simple type of DDoS attack "HTTP flood" using multithreading and a proxies. The program was created for informational purposes.
Stars: ✭ 28 (-36.36%)
TIGERPython toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Stars: ✭ 103 (+134.09%)
sgxwalletsgxwallet is the first-ever opensource high-performance hardware secure crypto wallet that is based on Intel SGX technology. First opensource product on Intel SGX whitelist. Scales to 100,000+ transactions per second. Currently supports ETH and SKALE, and will support BTC in the future. Sgxwallet is under heavy development and use by SKALE network.
Stars: ✭ 50 (+13.64%)
WPCrackerWordPress pentest tool
Stars: ✭ 34 (-22.73%)
assapAnti Shoulder Surfing Attack Platform (ASSAP)
Stars: ✭ 22 (-50%)
DeautherdroidAdditional android app for SpaceHunn's ESP8266 DeAuther.
Stars: ✭ 93 (+111.36%)
dheaterD(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.
Stars: ✭ 142 (+222.73%)