There are 7 repositories under attacks topic.
ipsets dynamically updated with firehol's update-ipsets.sh script
IPv6 attack toolkit
Fork of DDoS Deflate with fixes, improvements and new features.
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
Aggregated AbuseIPDB blocklists with worst IPv4 & IPv6 offenders (~99% confidence)
💡 Adversarial attacks on explanations and how to defend them
List of unsafe ed25519 signature libs
Contains Attack labs
List of state of the art papers, code, and other resources
Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC
Protocol agnostic online password guessing API.
List of proxy IP addresses used by bots
This repository contains code and data for "Tik-Tok: The Utility of Packet Timing in Website Fingerprinting Attacks" paper, published in PETS 2020.
A USB-based script for Ethical hacking with multiple attacks
2LS AntiBot is the ultimate antibot plugin for Minecraft or Spigot servers using BungeeCord. Superseded by FlameCord.
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
Hunter-Kit is a cross platform security toolkit and framework that can automate most of the pentesting engagement from the recon to reporting phase
Commands and Scripts to attack Linux and Servers
Cron caching of https://iplists.firehol.org (without private networks a.k.a RFC1918)
hacking tool
Generative AI-based CyberSecurity-focused Prompt Dataset for Benchmarking Large Language Models
A simple C# GUI interface that will allow Automatic login to a web page and can brute force the passwords on most web pages.
Cross Site Scripting ( XSS ) Vulnerability Payload List
BLOQUEZ LE PLAYERS.JSON / BLOCK IT PLAYERS.JSON [FIVEM]
A Cloudflare worker to generate and inject Content Security Policy nonces in returned HTML pages.
In this repository, DDOS attacks were detected using Recurrent Neural Networks (LSTM) and Classical Machine Learning Algorithms.
A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation