Trending repositories for topic attack
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Affordable WiFi hacking platform for testing and learning
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
We expose this user-friendly algorithm library (with an integrated evaluation platform) for beginners who intend to start federated learning (FL) study
Rapidly Search and Hunt through Windows Forensic Artefacts
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
We expose this user-friendly algorithm library (with an integrated evaluation platform) for beginners who intend to start federated learning (FL) study
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
Affordable WiFi hacking platform for testing and learning
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
We expose this user-friendly algorithm library (with an integrated evaluation platform) for beginners who intend to start federated learning (FL) study
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Rapidly Search and Hunt through Windows Forensic Artefacts
This script is designed for educational purposes only and allows users to simulate a DDoS attack. Please note that hacking is illegal and this script should not be used for any malicious activities. I...
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
This script is designed for educational purposes only and allows users to simulate a DDoS attack. Please note that hacking is illegal and this script should not be used for any malicious activities. I...
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
We expose this user-friendly algorithm library (with an integrated evaluation platform) for beginners who intend to start federated learning (FL) study
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Python toolbox to evaluate graph vulnerability and robustness (CIKM 2021)
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Affordable WiFi hacking platform for testing and learning
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
We expose this user-friendly algorithm library (with an integrated evaluation platform) for beginners who intend to start federated learning (FL) study
Fluxion is a remake of linset by vk496 with enhanced functionality.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Rapidly Search and Hunt through Windows Forensic Artefacts
A curated list of amazingly awesome Cybersecurity datasets
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
This script is designed for educational purposes only and allows users to simulate a DDoS attack. Please note that hacking is illegal and this script should not be used for any malicious activities. I...
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
We expose this user-friendly algorithm library (with an integrated evaluation platform) for beginners who intend to start federated learning (FL) study
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Bark Toolkit is a toolkit wich provides Denial-of-service attacks, SMS attacks and more.
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Improper Authorization Vulnerability in Confluence Data Center and Server + bonus 🔥
This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
Affordable WiFi hacking platform for testing and learning
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
We expose this user-friendly algorithm library (with an integrated evaluation platform) for beginners who intend to start federated learning (FL) study
Fluxion is a remake of linset by vk496 with enhanced functionality.
Rapidly Search and Hunt through Windows Forensic Artefacts
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
A curated list of amazingly awesome Cybersecurity datasets
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
A very simple script that uses special iptables rules and sysctl tweaks that protects your server(s) against many different network attacks.
Bark Toolkit is a toolkit wich provides Denial-of-service attacks, SMS attacks and more.
We expose this user-friendly algorithm library (with an integrated evaluation platform) for beginners who intend to start federated learning (FL) study
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Attack and Crack Private Key AIO (ALL in ONE) All Cryptocurency from words [HACK]
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
Exploring various defensive response options for effectively securing a 5G core-network
Curated Windows event log Sigma rules used in Hayabusa and Velociraptor.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.
:email::satellite: Spam thousands of WiFi access points with custom SSIDs