-
Updated
Feb 19, 2022 - Python
#
attack
Here are 456 public repositories matching this topic...
The Rogue Access Point Framework
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
attack
injection
fuzzing
sql-injection
bugbounty
payloads
fuzz
burpsuite
intruder
fuzz-lists
burpsuite-engagement
burpsuite-intruder
-
Updated
Sep 27, 2021 - BlitzBasic
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
python
machine-learning
privacy
ai
attack
extraction
inference
artificial-intelligence
evasion
red-team
poisoning
adversarial-machine-learning
blue-team
adversarial-examples
adversarial-attacks
trusted-ai
trustworthy-ai
-
Updated
Mar 5, 2022 - Python
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
windows
security
attack
active-directory
hacking
cheatsheet
enumeration
activedirectory
penetration-testing
cheat
pentesting
exploitation
hacking-tool
privilege-escalation
cheat-sheet
hacking-tools
windows-active-directory
active-directory-cheatsheet
active-directory-exploitation
hacking-cheasheet
-
Updated
Jan 2, 2022
Best DDoS Attack Script Python3, Cyber Attack With 44 Methods
ddos
dos
attack
cookie
ping
icmp
cloudflare
ddos-attacks
auto-proxy
ovh
flood
bypass
hacking-tool
ddos-tool
vse
ddos-attack-tools
layer4
cloudflare-bypass
ddos-script
minecraftbot
ddos-attack-script
ovh-bypass
amazon-bypass
ddosguard-bypass
-
Updated
Mar 6, 2022 - Python
ddos
tcp
attack
udp
sms
hacking
termux
flood
kali-linux
hacking-tool
calls
sms-bomber
kali-scripts
kali-nethunter
email-bomber
kali-linux-hacking
social-engeneering-toolkit
social-engeneering
sms-flooder
sip-killer
-
Updated
Oct 29, 2020 - Python
Cyber Threat Intelligence Repository expressed in STIX 2.0
-
Updated
Jan 10, 2022
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
linux
ssh
screenshot
spotify
database
attack
pastebin
hacking
databases
brute-force-attacks
rdp
breaches
bruteforce-password-cracker
bruteforcing
sshbruteforce
rdpattack
-
Updated
Feb 27, 2022 - Shell
ESP8266 firmware for performing deauthentication attacks, with ease.
arduino
esp8266
board
material-design
hack
attack
material-ui
wifi
probe
deauth
material-theme
beacon
-
Updated
Apr 27, 2021 - C
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
shell
attack
reverse-shell
penetration-testing
antivirus
shell-scripts
information-security
kali-linux
payload
offensive-security
payloads
kali
bypass-antivirus
antivirus-evasion
payload-generator
kali-scripts
amsi
kali-script
-
Updated
Nov 9, 2021 - PowerShell
The Shadow Attack Framework
-
Updated
Feb 21, 2022 - PowerShell
A DNS rebinding attack framework.
-
Updated
Feb 24, 2022 - JavaScript
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
microsoft
windows
cryptography
attack
gpu
opencl
cuda
hash
gpgpu
passwords
cracking
john-the-ripper
bitlocker
password-cracker
decryption-algorithm
bitcracker
-
Updated
Nov 19, 2021 - C
Best Tool For instagram Bruteforce hacking Tool By Waseem Akram. Made in Bash
instagram
hack
attack
evil
tor
hacking
devil
termux
kali-linux
hacking-tool
instagram-bot
bruteforce-password-cracker
instahack
hacking-tools
termux-hacking
worldlist
hackerwasi
insta-hack
insta-bruteforce
-
Updated
Mar 3, 2022 - Shell
LSTAR - CobaltStrike 综合后渗透插件
-
Updated
Jan 30, 2022 - PowerShell
Detect deauthentication frames using an ESP8266
arduino
esp8266
detect
attack
exploit
wifi
detector
deauth
wi-fi
prevention
deauthentication
disassociation
-
Updated
Nov 26, 2021 - C++
Scaum
commented
Feb 4, 2022
First of all, thanks for your work and publishing it along with the very interesting blog post.
I've been playing a bit with your POC, especially the Rust version, and there is something I'm not fully getting. Depending on the victim process, I get the following results:
- Majority of processes (e.g notepad): when the stomped function is called the shelllcode executes (calc pops open) and the
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
-
Updated
May 22, 2021 - PHP
hacker, ready for more of our story ! 🚀
security
tools
hack
attack
tool
scanner
hacking
poc
attacker
vulnerability
cracker
security-vulnerability
vulnerabilities
geek
hacker
attacks
hacking-tool
vulnerability-scanners
security-research
-
Updated
Apr 22, 2021 - Python
-
Updated
Aug 6, 2020 - Python
ThePhish: an automated phishing email analysis tool
python
attack
script
email
detection
incident-response
malware
phishing
webapp
cybersecurity
free
misp
thehive
digital-forensics
threat-intelligence
thehive4py
indicators-of-compromise
cyberdefense
phishing-detection
thehive4
-
Updated
Jan 19, 2022 - Python
Using Socks4/5 proxy to make a multithreading Http-flood/Https-flood (cc) attack.
python
ddos
attack
multithreading
socks
socks5
python3
ddos-attacks
flood
socks5-proxy
socks4
http-flood
ddos-attack-tools
web-attacks
dos-attack
socks4-proxy
cc-attack
-
Updated
Dec 29, 2021 - Python
Improve this page
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."
Hi, guys!
I am trying to reuse the OCR transformation module in TextFlint, but I somehow find it rather trivial...
I quote the code about the OCR rules in the source code as below: