All Projects → Timeless Timing Attacks → Similar Projects or Alternatives

188 Open source projects that are alternatives of or similar to Timeless Timing Attacks

Patrowlmanager
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Stars: ✭ 363 (+706.67%)
Mutual labels:  vulnerability-detection
Cloudfrunt
A tool for identifying misconfigured CloudFront domains
Stars: ✭ 281 (+524.44%)
Mutual labels:  vulnerability-detection
Dhcpwn
All your IPs are belong to us.
Stars: ✭ 642 (+1326.67%)
Mutual labels:  attack
Top25 Parameter
For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙
Stars: ✭ 388 (+762.22%)
Mutual labels:  vulnerability-detection
ShonyDanza
A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.
Stars: ✭ 86 (+91.11%)
Mutual labels:  vulnerability-detection
Paper collection
Academic papers related to fuzzing, binary analysis, and exploit dev, which I want to read or have already read
Stars: ✭ 710 (+1477.78%)
Mutual labels:  vulnerability-detection
Wazuh Ruleset
Wazuh - Ruleset
Stars: ✭ 305 (+577.78%)
Mutual labels:  vulnerability-detection
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+1893.33%)
Mutual labels:  vulnerability-detection
Mr.sip
SIP-Based Audit and Attack Tool
Stars: ✭ 266 (+491.11%)
Mutual labels:  attack
Impulse
💣 Impulse Denial-of-service ToolKit
Stars: ✭ 538 (+1095.56%)
Mutual labels:  attack
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+817.78%)
Mutual labels:  vulnerability-detection
mitre-visualizer
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
Stars: ✭ 49 (+8.89%)
Mutual labels:  attack
Graudit
grep rough audit - source code auditing tool
Stars: ✭ 747 (+1560%)
Mutual labels:  vulnerability-detection
Awesome Cybersecurity Datasets
A curated list of amazingly awesome Cybersecurity datasets
Stars: ✭ 380 (+744.44%)
Mutual labels:  attack
Physics Command
Physics platform is a tool for hardware systems (e.g: raspberryPi 3B ). It retrieves data passing through the network and sends it to a control panel. It works the same way as a botnet by receiving remote commands. (you can imagine that as a black box)
Stars: ✭ 23 (-48.89%)
Mutual labels:  attack
Nuclei
Fast and customizable vulnerability scanner based on simple YAML based DSL.
Stars: ✭ 6,307 (+13915.56%)
Mutual labels:  vulnerability-detection
Autordpwn
The Shadow Attack Framework
Stars: ✭ 688 (+1428.89%)
Mutual labels:  attack
Difuze
Fuzzer for Linux Kernel Drivers
Stars: ✭ 285 (+533.33%)
Mutual labels:  vulnerability-detection
Curl Collisions
An implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Stars: ✭ 20 (-55.56%)
Mutual labels:  attack
Dependencycheck
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Stars: ✭ 3,571 (+7835.56%)
Mutual labels:  vulnerability-detection
Seccubus
Easy automated vulnerability scanning, reporting and analysis
Stars: ✭ 615 (+1266.67%)
Mutual labels:  vulnerability-detection
AMEVulDetector
Smart Contract Vulnerability Detection From Pure Neural Network to Interpretable Graph Feature and Expert Pattern Fusion (IJCAI-21 Accepted)
Stars: ✭ 23 (-48.89%)
Mutual labels:  vulnerability-detection
Marsnake
System Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-64.44%)
Mutual labels:  vulnerability-detection
iyov
Web proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
Stars: ✭ 27 (-40%)
Mutual labels:  attack
Satansword
红队综合渗透框架
Stars: ✭ 482 (+971.11%)
Mutual labels:  vulnerability-detection
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (+817.78%)
Mutual labels:  attack
grunt-retire
Grunt plugin for retire.
Stars: ✭ 89 (+97.78%)
Mutual labels:  vulnerability-detection
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+1622.22%)
Mutual labels:  vulnerability-detection
Deauthdetector
Detect deauthentication frames using an ESP8266
Stars: ✭ 406 (+802.22%)
Mutual labels:  attack
Wi Pwn
ESP8266 Deauther ​with a material design WebUI 📶
Stars: ✭ 839 (+1764.44%)
Mutual labels:  attack
Duckhunt
🎯 Prevent RubberDucky (or other keystroke injection) attacks
Stars: ✭ 386 (+757.78%)
Mutual labels:  attack
Dependency Track
Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
Stars: ✭ 718 (+1495.56%)
Mutual labels:  vulnerability-detection
Securitymanageframwork
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (+740%)
Mutual labels:  vulnerability-detection
Safety
Safety checks your installed dependencies for known security vulnerabilities
Stars: ✭ 982 (+2082.22%)
Mutual labels:  vulnerability-detection
Ssrf vulnerable lab
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Stars: ✭ 361 (+702.22%)
Mutual labels:  attack
Emagnet
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Stars: ✭ 688 (+1428.89%)
Mutual labels:  attack
Api
Vulners Python API wrapper
Stars: ✭ 313 (+595.56%)
Mutual labels:  vulnerability-detection
Whour
Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.
Stars: ✭ 18 (-60%)
Mutual labels:  vulnerability-detection
Bootstomp
BootStomp: a bootloader vulnerability finder
Stars: ✭ 303 (+573.33%)
Mutual labels:  vulnerability-detection
Evilurl
Generate unicode evil domains for IDN Homograph Attack and detect them.
Stars: ✭ 654 (+1353.33%)
Mutual labels:  attack
Xunfeng
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+6857.78%)
Mutual labels:  vulnerability-detection
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+2142.22%)
Mutual labels:  vulnerability-detection
Fluxion
Fluxion is a remake of linset by vk496 with enhanced functionality.
Stars: ✭ 3,275 (+7177.78%)
Mutual labels:  attack
Singularity
A DNS rebinding attack framework.
Stars: ✭ 621 (+1280%)
Mutual labels:  attack
Arachni
Web Application Security Scanner Framework
Stars: ✭ 2,942 (+6437.78%)
Mutual labels:  vulnerability-detection
Tcp Connection Hijack Reset
Simple scapy-based tool to hijack and reset existing TCP connections
Stars: ✭ 17 (-62.22%)
Mutual labels:  attack
Nerve
NERVE Continuous Vulnerability Scanner
Stars: ✭ 267 (+493.33%)
Mutual labels:  vulnerability-detection
Esp8266 beaconspam
Creates up to a thousand WiFi access points with custom SSIDs.
Stars: ✭ 575 (+1177.78%)
Mutual labels:  attack
T3
[EMNLP 2020] "T3: Tree-Autoencoder Constrained Adversarial Text Generation for Targeted Attack" by Boxin Wang, Hengzhi Pei, Boyuan Pan, Qian Chen, Shuohang Wang, Bo Li
Stars: ✭ 25 (-44.44%)
Mutual labels:  attack
Wazuh Chef
Wazuh - Chef cookbooks
Stars: ✭ 9 (-80%)
Mutual labels:  vulnerability-detection
rpl-attacks
RPL attacks framework for simulating WSN with a malicious mote based on Contiki
Stars: ✭ 56 (+24.44%)
Mutual labels:  attack
Buy pig plan
电话攻击(电话轰炸、可代替短信轰炸)、留言攻击工具 | 已删库
Stars: ✭ 506 (+1024.44%)
Mutual labels:  attack
NSE-scripts
NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473
Stars: ✭ 105 (+133.33%)
Mutual labels:  vulnerability-detection
Vfeed
The Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+1735.56%)
Mutual labels:  vulnerability-detection
Chimera
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Stars: ✭ 463 (+928.89%)
Mutual labels:  attack
Burpbounty
Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
Stars: ✭ 1,026 (+2180%)
Mutual labels:  vulnerability-detection
Arpspoof
arpspoof for macOS - intercept packets on a switched LAN
Stars: ✭ 40 (-11.11%)
Mutual labels:  attack
Trivy
Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues
Stars: ✭ 9,673 (+21395.56%)
Mutual labels:  vulnerability-detection
Cti
Cyber Threat Intelligence Repository expressed in STIX 2.0
Stars: ✭ 822 (+1726.67%)
Mutual labels:  attack
Bitcracker
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Stars: ✭ 463 (+928.89%)
Mutual labels:  attack
1-60 of 188 similar projects