-
Updated
Jul 7, 2022 - Python
#
attack
Here are 500 public repositories matching this topic...
The Rogue Access Point Framework
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
ddos
dos
attack
cookie
ping
icmp
cloudflare
ddos-attacks
auto-proxy
ovh
flood
bypass
hacking-tool
ddos-tool
vse
ddos-attack-tools
layer4
cloudflare-bypass
ddos-script
minecraftbot
ddos-attack-script
ovh-bypass
amazon-bypass
ddosguard-bypass
-
Updated
Jul 18, 2022 - Python
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
python
machine-learning
privacy
ai
attack
extraction
inference
artificial-intelligence
evasion
red-team
poisoning
adversarial-machine-learning
blue-team
adversarial-examples
adversarial-attacks
trusted-ai
trustworthy-ai
-
Updated
Jul 22, 2022 - Python
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
windows
security
attack
active-directory
hacking
cheatsheet
enumeration
activedirectory
penetration-testing
cheat
pentesting
exploitation
hacking-tool
privilege-escalation
cheat-sheet
hacking-tools
windows-active-directory
active-directory-cheatsheet
active-directory-exploitation
hacking-cheasheet
-
Updated
Mar 30, 2022
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
attack
injection
fuzzing
sql-injection
bugbounty
payloads
fuzz
burpsuite
intruder
fuzz-lists
burpsuite-engagement
burpsuite-intruder
-
Updated
Sep 27, 2021 - BlitzBasic
ddos
tcp
attack
udp
sms
hacking
termux
flood
kali-linux
hacking-tool
calls
sms-bomber
kali-scripts
kali-nethunter
email-bomber
kali-linux-hacking
social-engeneering-toolkit
social-engeneering
sms-flooder
sip-killer
-
Updated
Oct 29, 2020 - Python
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
linux
ssh
screenshot
spotify
database
attack
pastebin
hacking
databases
brute-force-attacks
rdp
breaches
bruteforce-password-cracker
bruteforcing
sshbruteforce
rdpattack
-
Updated
Jun 21, 2022 - Shell
Cyber Threat Intelligence Repository expressed in STIX 2.0
-
Updated
Jul 7, 2022
ESP8266 firmware for performing deauthentication attacks, with ease.
arduino
esp8266
board
material-design
hack
attack
material-ui
wifi
probe
deauth
material-theme
beacon
-
Updated
Apr 8, 2022 - C
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
shell
attack
reverse-shell
penetration-testing
antivirus
shell-scripts
information-security
kali-linux
payload
offensive-security
payloads
kali
bypass-antivirus
antivirus-evasion
payload-generator
kali-scripts
amsi
kali-script
-
Updated
Nov 9, 2021 - PowerShell
The Shadow Attack Framework
-
Updated
Feb 21, 2022 - PowerShell
A DNS rebinding attack framework.
-
Updated
Apr 11, 2022 - JavaScript
LSTAR - CobaltStrike 综合后渗透插件
-
Updated
Jan 30, 2022 - PowerShell
Vulnerabilities Scan: 15000+PoCs; 20 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty...
ssh
golang
tools
attack
nmap
brute-force
nuclei
auto
bugbounty
hacker
0day
pentest-tool
hacktools
bugbounty-tools
vulnerabilities-scan
-
Updated
Jul 22, 2022 - Go
instahack is a bash & python based script which is officially made to test password strength of Instagram account from termux and kali with bruteforce attack and. it based on tor This tool works on both rooted Android device and Non-rooted Android device. Best Tool For Instagram Bruteforce hacking Tool By Waseem Akram. Made in Bash & python. This is an official repository of instahack
instagram
hack
attack
evil
tor
hacking
devil
termux
kali-linux
hacking-tool
instagram-bot
bruteforce-password-cracker
instahack
hacking-tools
termux-hacking
worldlist
hackerwasi
insta-hack
insta-bruteforce
instahack-license
-
Updated
Jul 15, 2022 - Shell
Active Directory & Red-Team Cheat-Sheet in constant expansion.
cheat-sheets
tools
attack
powershell
active-directory
hacking
cheatsheet
enumeration
pentesting
bypass-antivirus
oscp
cheat-sheet
redteaming
redteam
real-life
osep
attacking-active-directory
-
Updated
Jun 7, 2022 - Go
ThePhish: an automated phishing email analysis tool
python
attack
script
email
detection
incident-response
malware
phishing
webapp
cybersecurity
free
misp
thehive
digital-forensics
threat-intelligence
thehive4py
indicators-of-compromise
cyberdefense
phishing-detection
thehive4
-
Updated
Jan 19, 2022 - Python
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
microsoft
windows
cryptography
attack
gpu
opencl
cuda
hash
gpgpu
passwords
cracking
john-the-ripper
bitlocker
password-cracker
decryption-algorithm
bitcracker
-
Updated
Nov 19, 2021 - C
Open
About OCR generation
2
Scaum
commented
Feb 4, 2022
First of all, thanks for your work and publishing it along with the very interesting blog post.
I've been playing a bit with your POC, especially the Rust version, and there is something I'm not fully getting. Depending on the victim process, I get the following results:
- Majority of processes (e.g notepad): when the stomped function is called the shelllcode executes (calc pops open) and the
bug
Something isn't working
help wanted
Extra attention is needed
good first issue
Good for newcomers
Detect deauthentication frames using an ESP8266
arduino
esp8266
detect
attack
exploit
wifi
detector
deauth
wi-fi
prevention
deauthentication
disassociation
-
Updated
Nov 26, 2021 - C++
Improve this page
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."
Hi, guys!
I am trying to reuse the OCR transformation module in TextFlint, but I somehow find it rather trivial...
I quote the code about the OCR rules in the source code as below: