Cowrie SSH/Telnet Honeypot
#
attacker
Repositories 27
An Android library that prevents your app from being pirated / cracked using Google Play Licensing (LVL), APK signatu…
Java
Updated Jan 19, 2019
hacking is a kind of spirit !
hack
attack
geek
cracker
poc
hacking
tools
hacker
hacking-tool
attacker
attacks
security-vulnerability
scanner
vulnerability
vulnerabilities
vulnerability-scanners
security
security-research
tool
Python
Updated Mar 20, 2019
Authenticate against a MySQL server without knowing the cleartext password
C
Updated Mar 18, 2017
Python
Updated Jan 31, 2019
Bruteforce attack on Facebook account using python script
Python
Updated Feb 22, 2019
SkyArk helps to discover, assess and secure the most privileged entities in AWS
PowerShell
Updated Mar 12, 2019
Fully featured Remote Administration Tool (RAT) built in C# for Windows 7+
malware
rat
csharp
windows
networking
reverse-shell
beta
target-machine
attacker
victim
administration
netcat
port-listener
pipe
C#
Updated Jan 11, 2018
fake
access-point
pentesting
redteam
blueteam
wifi
security
attacker
probe-requests
corporations
user
Python
Updated Jul 23, 2018
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
HTML
Updated Mar 18, 2018
this is an offensive security tool
Python
Updated Feb 5, 2018
Automate the creation of Backdoors and postexplotation activities
backdoors
attacker
metasploit
backdoors-created
msfvenom
metasploit-payloads
unicorn
listener
postexplotation
Python
Updated Apr 8, 2018
Pothead: A simple lightweight packet for creating a minimal interaction honeypot
PHP
Updated Jul 11, 2017
Mikrotik 0day Credential Disclosure Scanner
mikrotik-routeros
mikrotik
python
shodan
hacking
mikrotik-router
0day
credentials
disclosure
scanner
attacker
authentication
dns
dns-over-https
Updated Oct 1, 2018
Detection of DDOS Attack using Kafka and Spark Streaming
ddos-attacks
attacker
spark
spark-streaming
kafka
kafka-producer
kafka-consumer
kafka-topic
apache
apache-spark
log
ddos-detection
ddos
Python
Updated May 12, 2018
Compilation of files recovered from compromised hosts. This collection contains various scripts and tools used by the…
hacker-scripts
compilation
scripts
kaker-scripts
attacker
files-recovered
security
backdoors
shell
phishing-attacks
scanners
Perl
Updated Jul 18, 2017
Hudinx is a tiny interaction SSH honeypot engineered in Python to log brute force attacks and, most importantly, the …
Tcl
Updated Dec 12, 2018
I wrote a little ddos script, to run just use python or python2
Python
Updated Feb 18, 2019
Internet Security tool that can stress test a site, programmed in Python. This tool uses keep-alive DoS to do that.
dos
ddos
ddos-tool
ddos-attack
ddos-attack-tools
python-script
socket-programming
sockets
socket
netsec
attacker
keep-alive
python
dos-attack
stress-test
stress
stress-tester
stresstest
python-socket-requests
python3
Python
Updated Jan 19, 2019
HTML
Updated Apr 5, 2017
Parallel geometric attacks on neural network key exchange protocol
C
Updated Aug 3, 2018
This project simulates DNSSEC (especially NSEC) focusing how to prevent zone walking attack
Java
Updated Aug 24, 2018
Guardini is a package designed for programmers who are looking to sell access to their API endpoints and need a good,…
JavaScript
Updated Feb 1, 2017
Shop View, Like Attacker
Python
Updated Oct 17, 2018
This project focusses on creating an attacker against Deep Neural Networks making them misclassify an image. This is …
Jupyter Notebook
Updated Mar 15, 2018
白帽SEO是一种精神!
hack
attack
geek
cracker
poc
hacking
tools
hacker
hacking-tool
attacker
attacks
security-vulnerability
scanner
vulnerablility
vulnerablilitise
vulnerability-scanners
security
security-research
tool
Python
Updated Feb 21, 2019