Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io
-
Updated
Jul 31, 2020 - Python
Cowrie SSH/Telnet Honeypot http://cowrie.readthedocs.io
An Android library that prevents your app from being pirated / cracked using Google Play Licensing (LVL), APK signature protection and more. API 14+ required.
Kubernetes security notes and best practices
hacker, ready for more of our story !
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
Bruteforce attack on Facebook account using python script
Next Generation Remote Administration Tool (RAT)
Facebrute is an advance facebook Bruteforce script made in python language. Just provide username & wordlist and this script is going to try all passwords with returning responses as well. It uses python-requests with tor stem controller that changes its Public IP on every attempt as facebook block IP that try 20 attempts at once.
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
Attacker can use the scripts to gain reverse shell of a target's machine.
this is an offensive security tool
CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to detect original Server's IP
This program allow you to extract some features from pcap files.
Automate the creation of Backdoors and postexplotation activities
Detection of DDOS Attack using Kafka and Spark Streaming
Compilation of files recovered from compromised hosts. This collection contains various scripts and tools used by the attackers.
Internet Security tool that can stress test a site, programmed in Python. This tool uses keep-alive DoS to do that.
Pothead: A simple lightweight packet for creating a minimal interaction honeypot
白帽SEO是一种精神!
Mikrotik 0day Credential Disclosure Scanner
Cross Site Scripting ( XSS ) Vulnerability Payload List
OS Command Injection Vulnerability Payload List
This project focusses on creating an attacker against Deep Neural Networks making them misclassify an image. This is done to evaluate to robustness of the model.
Add a description, image, and links to the attacker topic page so that developers can more easily learn about it.
To associate your repository with the attacker topic, visit your repo's landing page and select "manage topics."