114 Open Source Attack Software Projects
Free and open source attack code projects including engines, APIs, generators, and tools.
Intruderpayloads 2390 ⭐
A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and checklists.
Hiddeneye 2013 ⭐
Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]
Adversarial Robustness Toolbox 1772 ⭐
Adversarial Robustness Toolbox (ART) - Python Library for Machine Learning Security - Evasion, Poisoning, Extraction, Inference
Active Directory Exploitation Cheat Sheet 761 ⭐
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Bitcracker 414 ⭐
BitCracker is the first open source password cracking tool for memory units encrypted with BitLocker
Ssrf_vulnerable_lab 339 ⭐
This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack
Tokyoneon Armor 212 ⭐
Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.
Arduinoarpspoof 205 ⭐
Kicks out everyone in your LAN via with an enc28j60 ethernet controller and Arduino.
Attack Defense Framework 176 ⭐
:triangular_flag_on_post: A framework for CTF Attack with Defense Mode
Camerattack 169 ⭐
An attack tool designed to remotely disable CCTV camera streams (like in spy movies)
Diffai 161 ⭐
A certifiable defense against adversarial examples by training neural networks to be provably robust
Free_adv_train 116 ⭐
Official TensorFlow Implementation of Adversarial Training for Free! which trains robust models at no extra cost compared to natural training.
Kali Linux Tools Interface 110 ⭐
Graphical Web interface developed to facilitate the use of security information tools.
Misp Maltego 102 ⭐
Set of Maltego transforms to inferface with a MISP Threat Sharing instance, and also to explore the whole MITRE ATT&CK dataset.
Wbruter 97 ⭐
Crack your non-rooted android device pin code with 100% guarantee aslong as usb debugging has been enable. Wbruter also has support for parallel ssh brute forcing via pssh
Spectre Attack Demo 78 ⭐
Reproducing malicious memory reading on Intel i5 and Intel Xeon using a Spectre attack
Jpeg Defense 68 ⭐
SHIELD: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression
Xssmap 57 ⭐
Intelligent XSS detection tool that uses human techniques for looking for reflected cross-site scripting (XSS) vulnerabilities
Eddsa Fault Attack 52 ⭐
Fault attack agaisnt EdDSA demonstrated on an Arduino Nano board, allowing for partial key recovery and fake signatures.
Dawgmon 47 ⭐
dawg the hallway monitor - monitor operating system changes and analyze introduced attack surface when installing software
Arcane 50 ⭐
Arcane is a simple script designed to backdoor iOS packages (iphone-arm) and create the necessary resources for APT repositories.
Rsa_pkcs1v1_5_attacks 35 ⭐
Implementation of Bleichenbacher, Manger and Ben-Or attacks on RSA PKCS#1 v1.5
Iyov 27 ⭐
Web proxy for http(s) for developers to analyze data between client and servers based on workerman, especailly for app developers.
Tokyoneon Chimera 197 ⭐
Chimera is a (shiny and very hack-ish) PowerShell obfuscation script designed to bypass AMSI and commercial antivirus solutions.
Timeless Timing Attacks 27 ⭐
A Python implementation that facilitates finding timeless timing attack vulnerabilities.
Sgx Tutorial Space18 24 ⭐
Tutorial: Uncovering and mitigating side-channel leakage in Intel SGX enclaves
Curl Collisions 20 ⭐
An implementation of Heilman et al.'s differential attack on IOTA's Curl hashing function.
Tcp Connection Hijack Reset 17 ⭐
Simple scapy-based tool to hijack and reset existing TCP connections
Solidity Truffle Tests 16 ⭐
A series of attack tests on commonly used libraries and contracts in the ethereum web space
Ndiab Crypto 17 ⭐
Python3 implementation of Cryptographic attacks. Applcations examples introduced on my blog.