Trending repositories for topic attack
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Fluxion is a remake of linset by vk496 with enhanced functionality.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Affordable WiFi hacking platform for testing and learning
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Creates up to a thousand WiFi access points with custom SSIDs.
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
Creates up to a thousand WiFi access points with custom SSIDs.
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Affordable WiFi hacking platform for testing and learning
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Affordable WiFi hacking platform for testing and learning
Fluxion is a remake of linset by vk496 with enhanced functionality.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Rapidly Search and Hunt through Windows Forensic Artefacts
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Creates up to a thousand WiFi access points with custom SSIDs.
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
:email::satellite: Spam thousands of WiFi access points with custom SSIDs
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
Additional android app for SpaceHunn's ESP8266 DeAuther.
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
:email::satellite: Spam thousands of WiFi access points with custom SSIDs
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Affordable WiFi hacking platform for testing and learning
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Rapidly Search and Hunt through Windows Forensic Artefacts
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
A curated list of amazingly awesome Cybersecurity datasets
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
AMITT (Adversarial Misinformation and Influence Tactics and Techniques) framework for describing disinformation incidents. Includes TTPs and countermeasures.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone o...
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
A curated list of amazingly awesome Cybersecurity datasets
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Affordable WiFi hacking platform for testing and learning
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Rapidly Search and Hunt through Windows Forensic Artefacts
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
A curated list of amazingly awesome Cybersecurity datasets
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 20 datasets.
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
Bark Toolkit is a toolkit wich provides Denial-of-service attacks, SMS attacks and more.
This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
:email::satellite: Spam thousands of WiFi access points with custom SSIDs