Trending repositories for topic attack
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Affordable WiFi hacking platform for testing and learning
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Rapidly Search and Hunt through Windows Forensic Artefacts
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
A curated list of amazingly awesome Cybersecurity datasets
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
Attack and Crack Private Key AIO (ALL in ONE) All Cryptocurency from words [HACK]
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Generate unicode domains for IDN Homograph Attack and detect them.
Attack and Crack Private Key AIO (ALL in ONE) All Cryptocurency from words [HACK]
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A curated list of amazingly awesome Cybersecurity datasets
Rapidly Search and Hunt through Windows Forensic Artefacts
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Affordable WiFi hacking platform for testing and learning
Generate unicode domains for IDN Homograph Attack and detect them.
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Affordable WiFi hacking platform for testing and learning
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Rapidly Search and Hunt through Windows Forensic Artefacts
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
A curated list of amazingly awesome Cybersecurity datasets
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
A survey on harmful fine-tuning attack for large language model
Generate unicode domains for IDN Homograph Attack and detect them.
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
A survey on harmful fine-tuning attack for large language model
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Fast Sms Bomber Türkiye. It is a crime to use it to disturb people. This software was created to draw attention to security vulnerabilities on sites. Don't forget to check out our other projects.
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A curated list of amazingly awesome Cybersecurity datasets
This script is designed for educational purposes only and allows users to simulate a DDoS attack. Please note that hacking is illegal and this script should not be used for any malicious activities. I...
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Rapidly Search and Hunt through Windows Forensic Artefacts
Affordable WiFi hacking platform for testing and learning
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
A survey on harmful fine-tuning attack for large language model
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
A curated list of amazingly awesome Cybersecurity datasets
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Creates up to a thousand WiFi access points with custom SSIDs.
A survey on harmful fine-tuning attack for large language model
Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x
Some Useful Tricks for Pentest Android and iOS Apps
Fast Sms Bomber Türkiye. It is a crime to use it to disturb people. This software was created to draw attention to security vulnerabilities on sites. Don't forget to check out our other projects.
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
Rapidly Search and Hunt through Windows Forensic Artefacts
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
Attack and Crack Private Key AIO (ALL in ONE) All Cryptocurency from words [HACK]
A curated list of amazingly awesome Cybersecurity datasets
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
A survey on harmful fine-tuning attack for large language model
Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Affordable WiFi hacking platform for testing and learning
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Rapidly Search and Hunt through Windows Forensic Artefacts
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
A curated list of amazingly awesome Cybersecurity datasets
This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!
Some Useful Tricks for Pentest Android and iOS Apps
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
Fast Sms Bomber Türkiye. It is a crime to use it to disturb people. This software was created to draw attention to security vulnerabilities on sites. Don't forget to check out our other projects.
Repository with quick triggers to help during Pentest in an Active Directory environment.
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
Bark Toolkit is a toolkit wich provides Denial-of-service attacks, SMS attacks and more.