There are 5 repositories under attacker topic.
🎯 SQL Injection Payload List
Bruteforce attack on Facebook account using python script
An Android library that prevents your app from being pirated / cracked using Google Play Licensing (LVL), APK signature protection and more. API 14+ required.
Kubernetes security notes and best practices
:poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:
Authenticate against a MySQL server without knowing the cleartext password
Botnet targeting Windows machines written entirely in Python & open source security project.
OS Command Injection Vulnerability Payload List
This program allow you to extract some features from pcap files.
👨💻🕵🏻👩💻 Analyze user behavior against fake access points📡
SIPCheck is a tool that watch the authentication of users of Asterisk and bans automatically if some user (or bot) try to register o make calls using wrong passwords.
Automate the creation of Backdoors and postexplotation activities
All my ducky script for my malduino
Cross Site Scripting ( XSS ) Vulnerability Payload List
CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to detect original Server's IP
Strong DDoser Script
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
Attacker can use the scripts to gain reverse shell of a target's machine.
A DHCP starvation tool written in python
Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volume from the copied EBS snapshot. After that, the module attaches and mounts the EBS volume to an EC2 instance. Finally, attacker can ssh into an EC2 instance and inspect a mounted volume "/usr/src/hack".
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.
Offensive Terraform module which creates RDS database from a publicly exposed RDS snapshot in attacker's AWS account. After that, attacker can connect to RDS database and inspect it.
ChatGPT as artificial intelligence gives us great opportunities in the security and protection of the Bitcoin cryptocurrency from various attacks
this is an offensive security tool
白帽SEO是一种精神!
Detection of DDOS Attack using Kafka and Spark Streaming
Mikrotik 0day Credential Disclosure Scanner
Cold Wallets and Hot Wallets how to find vulnerabilities and eliminate various attacks on the Blockchain
PyTorch Implementation for NeurIPS 2022 paper 'Towards Reasonable Budget Allocation in Untargeted Graph Structure Attacks via Gradient Debias'