There are 6 repositories under attacks topic.
ipsets dynamically updated with firehol's update-ipsets.sh script
IPv6 attack toolkit
Fork of DDoS Deflate with fixes, improvements and new features.
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
💡 Adversarial attacks on explanations and how to defend them
List of unsafe ed25519 signature libs
Contains Attack labs
List of state of the art papers, code, and other resources
Digital Image Watermarking Method Based on Hybrid DWT-HD-SVD Technique: Attacks, PSNR, SSIM, NC
Protocol agnostic online password guessing API.
Abuseipdb IP Aggregator
A USB-based script for Ethical hacking with multiple attacks
EAD: Elastic-Net Attacks to Deep Neural Networks via Adversarial Examples
hacking tool
A simple C# GUI interface that will allow Automatic login to a web page and can brute force the passwords on most web pages.
BLOQUEZ LE PLAYERS.JSON / BLOCK IT PLAYERS.JSON [FIVEM]
Cron caching of https://iplists.firehol.org (without private networks a.k.a RFC1918)
Cross Site Scripting ( XSS ) Vulnerability Payload List
A collection of attacks metadata that were used in my previous pen-test tools
In this repository, DDOS attacks were detected using Recurrent Neural Networks (LSTM) and Classical Machine Learning Algorithms.
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/defeating-secure-boot-with-symlink-attacks.html
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
A Cloudflare worker to generate and inject Content Security Policy nonces in returned HTML pages.
This is created for updating Various Viruses, malware, and all! Also new kind for vulnerability and attacks!
The official repository for CosPGD: a unified white-box adversarial attack for pixel-wise prediction tasks.
A proof-of-concept for an Anomaly-based Intrusion Detection System based on a neural network.