There are 40 repositories under attack topic.
The Rogue Access Point Framework
Affordable WiFi hacking platform for testing and learning
Best DDoS Attack Script Python3, (Cyber / DDos) Attack With 56 Methods
Fluxion is a remake of linset by vk496 with enhanced functionality.
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference - Red and Blue Teams
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
:bomb: Impulse Denial-of-service ToolKit
Rapidly Search and Hunt through Windows Event Logs
Automated hacking tool that will find leaked databases with 97.1% accurate to grab mail + password together from recent uploads from https://pastebin.com. Bruteforce support for spotify accounts, instagram accounts, ssh servers, microsoft rdp clients and gmail accounts
Cyber Threat Intelligence Repository expressed in STIX 2.0
Wi-Fi Exploitation Framework
ESP8266 firmware for performing deauthentication attacks, with ease.
Chimera is a PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Generate unicode domains for IDN Homograph Attack and detect them.
Creates up to a thousand WiFi access points with custom SSIDs.
A curated list of amazingly awesome Cybersecurity datasets
instahack is a bash & python based script which is officially made to test password strength of Instagram account from termux and kali with bruteforce attack and. it based on tor This tool works on both rooted Android device and Non-rooted Android device. Best Tool For Instagram Bruteforce hacking Tool By Waseem Akram. Made in Bash & python. This is an official repository of instahack
Active Directory & Red-Team Cheat-Sheet in constant expansion.
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Crack legacy zip encryption with Biham and Kocher's known plaintext attack.
ThePhish: an automated phishing email analysis tool
Unified Multilingual Robustness Evaluation Toolkit for Natural Language Processing
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
A new shellcode injection technique. Given as C++ header, standalone Rust program or library.
Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.
Detect deauthentication frames using an ESP8266
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
hacker, ready for more of our story ! 🚀
:dart: Prevent RubberDucky (or other keystroke injection) attacks