Trending repositories for topic attack
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Affordable WiFi hacking platform for testing and learning
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
A survey on harmful fine-tuning attack for large language model
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
Bypass UAC by hijacking a DLL located in the Native Image Cache
This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
A curated list of amazingly awesome Cybersecurity datasets
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 24 datasets. www.pfllib.com/
A survey on harmful fine-tuning attack for large language model
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
Bypass UAC by hijacking a DLL located in the Native Image Cache
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
A curated list of amazingly awesome Cybersecurity datasets
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 24 datasets. www.pfllib.com/
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Affordable WiFi hacking platform for testing and learning
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Fluxion is a remake of linset by vk496 with enhanced functionality.
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
Some Useful Tricks for Pentest Android and iOS Apps
A survey on harmful fine-tuning attack for large language model
Rapidly Search and Hunt through Windows Forensic Artefacts
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
Some Useful Tricks for Pentest Android and iOS Apps
A survey on harmful fine-tuning attack for large language model
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
This script is designed for educational purposes only and allows users to simulate a DDoS attack. Please note that hacking is illegal and this script should not be used for any malicious activities. I...
Bypass UAC by hijacking a DLL located in the Native Image Cache
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc.. )
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Affordable WiFi hacking platform for testing and learning
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Rapidly Search and Hunt through Windows Forensic Artefacts
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Fluxion is a remake of linset by vk496 with enhanced functionality.
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 24 datasets. www.pfllib.com/
A curated list of amazingly awesome Cybersecurity datasets
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
A survey on harmful fine-tuning attack for large language model
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Generate unicode domains for IDN Homograph Attack and detect them.
This is the official code for the paper "Vaccine: Perturbation-aware Alignment for Large Language Models" (NeurIPS2024)
A survey on harmful fine-tuning attack for large language model
Some Useful Tricks for Pentest Android and iOS Apps
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
Advanced phishing tool | Automated Self-Hosting | SSH tunneling | 32+ Templates | Remastered version of xHak9x. (The only one you will find which is working fr)
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Fast Sms Bomber Türkiye. It is a crime to use it to disturb people. This software was created to draw attention to security vulnerabilities on sites. Don't forget to check out our other projects.
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
Repository with quick triggers to help during Pentest in an Active Directory environment.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Rapidly Search and Hunt through Windows Forensic Artefacts
A survey on harmful fine-tuning attack for large language model
Stratosphere Cyber Range to learn cybersecurity attacking and defending techniques locally in your computer
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
This is the official code for the paper "Vaccine: Perturbation-aware Alignment for Large Language Models" (NeurIPS2024)
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Affordable WiFi hacking platform for testing and learning
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 24 datasets. www.pfllib.com/
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Rapidly Search and Hunt through Windows Forensic Artefacts
Fluxion is a remake of linset by vk496 with enhanced functionality.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
Attack Surface Management & Red Team Simulation Platform 互联网攻击面管理&红队模拟平台
A curated list of amazingly awesome Cybersecurity datasets
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!!
Some Useful Tricks for Pentest Android and iOS Apps
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
Fast Sms Bomber Türkiye. It is a crime to use it to disturb people. This software was created to draw attention to security vulnerabilities on sites. Don't forget to check out our other projects.
An automated tool kit that clones sites and builds malicious javascript , deploys public Tunneling and send info through telegram Bot
Repository with quick triggers to help during Pentest in an Active Directory environment.
37 traditional FL (tFL) or personalized FL (pFL) algorithms, 3 scenarios, and 24 datasets. www.pfllib.com/
This repository contains the artifacts for the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
Dump read-out protected STM32F1's with a Pi Pico - A Pi Pico implementation of @JohannesObermaier's, Marc Schink's and Kosma Moczek's Glitch and FPB attack to bypass RDP (read-out protection) level 1 ...
Looking for the BadKB files you saw in my video? Here they are. Only for educational purposes, of course.
Crypto Deep Tools a set of scripts for detailed cryptanalysis of the Blockchain network in cryptocurrency Bitcoin
Bark Toolkit is a toolkit wich provides Denial-of-service attacks, SMS attacks and more.