Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
-
Updated
Jun 22, 2022 - Python
{{ message }}
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
An Android library that prevents your app from being pirated / cracked using Google Play Licensing (LVL), APK signature protection and more. API 14+ required.
Bruteforce attack on Facebook account using python script
SkyArk helps to discover, assess and secure the most privileged entities in Azure and AWS
Kubernetes security notes and best practices
hacker, ready for more of our story !
Botnet targeting Windows machines written entirely in Python & open source security project.
This program allow you to extract some features from pcap files.
OS Command Injection Vulnerability Payload List
Strong DDoser Script
CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to detect original Server's IP
Attacker can use the scripts to gain reverse shell of a target's machine.
Automate the creation of Backdoors and postexplotation activities
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume "/usr/src/hack".
Cross Site Scripting ( XSS ) Vulnerability Payload List
Offensive Terraform module which creates RDS database from a publicly exposed RDS snapshot in attacker's AWS account. After that, attacker can connect to RDS database and inspect it.
this is an offensive security tool
Detection of DDOS Attack using Kafka and Spark Streaming
A DHCP starvation tool written in python
白帽SEO是一种精神!
Mikrotik 0day Credential Disclosure Scanner
All my ducky script for my malduino
Add a description, image, and links to the attacker topic page so that developers can more easily learn about it.
To associate your repository with the attacker topic, visit your repo's landing page and select "manage topics."