Attack Circumventing Backdoor Defenses That Are Based on Latent Separability Circumventing Backdoor Defenses That Are Based on Latent Separability 27 July 2022
Attack An AnyLogic simulation allowing users to visually estimate the risk of cyber attacks as well as the cost and efficacy of controls An AnyLogic simulation allowing users to visually estimate the risk of cyber attacks as well as the cost and efficacy of controls 26 July 2022
Neural Network Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks Code Implementation for Traceback of Data Poisoning Attacks in Neural Networks 09 July 2022
Attack Source code for the Energy-Latency Attacks via Sponge Poisoning paper Source code for the Energy-Latency Attacks via Sponge Poisoning paper 16 March 2022
Password AttackOnFtp - A password brute force tool for ftp made with python AttackOnFtp - A password brute force tool for ftp made with python 13 March 2022
Attack Adversarial Robustness, White-box, Adversarial Attack Adversarial Robustness, White-box, Adversarial Attack 09 March 2022
Scripts Best DDoS Attack Script Python3, Cyber Attack With 40 Methods Best DDoS Attack Script Python3, Cyber Attack With 40 Methods 06 March 2022
Email Send email & telegram message whenever an analog in is recieved (so when attached to an alarm siren out it will alert via mail) Send email & telegram message whenever an analog in is recieved (so when attached to an alarm siren out it will alert via mail) 13 February 2022
Attack The source code of the printjack and phonejack attacks The source code of the printjack and phonejack attacks 13 February 2022
Tool A Python Tools for dos (denial-of-service) website / web server Tools for dos (denial-of-service) website / web server 12 February 2022
Random An API which returns random AOT quote everytime it's invoked An API which returns random AOT quote everytime it's invoked 10 February 2022
GUI BappG-Attack fullt GUI version for windows mac and linux still in development BappG-Attack fullt GUI version for windows mac and linux still in development 10 February 2022
Games The N Queen is the problem of placing N chess queens on an N×N chessboard so that no two queens attack each other The N Queen is the problem of placing N chess queens on an N×N chessboard so that no two queens attack each other 07 February 2022
Toolkit The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element The Social-Engineer Toolkit (SET) is specifically designed to perform advanced attacks against the human element 02 February 2022
Attack You can do Man In The Middle attack with this program You can do Man In The Middle attack with this program 28 January 2022
Security Surf_Sec - Security system to prevent Shoulder Surfing Attacks Security system to prevent Shoulder Surfing Attacks 28 January 2022
Attack Predicting Keystrokes using an Audio Side-Channel Attack and Machine Learning Predicting Keystrokes using an Audio Side-Channel Attack and Machine Learning 21 January 2022
Attack DCSync Attack from Outside using Impacket DCSync Attack from Outside using Impacket 20 January 2022
Generator M-Fire - A framework that can be used to generate DDOS Attack, Bombing, Text Repeat, Strong Password M-Fire - A framework that can be used to generate DDOS Attack, Bombing, Text Repeat, Strong Password 19 January 2022
ddos M-Fire - A framework that can be used to generate DDOS Attack, Bombing, Text Repeat, Strong Password M-Fire - A framework that can be used to generate DDOS Attack, Bombing, Text Repeat, Strong Password 18 January 2022
Password Pgen is the best brute force password generator and it is improved from the cupp.py Pgen is the best brute force password generator and it is improved from the cupp.py 17 January 2022
Random Numbers Statistical Random Number Generator Attack Against The Kirchhoff-law-johnson-noise (Kljn) Secure Key Exchange Protocol Statistical Random Number Generator Attack Against The Kirchhoff-law-johnson-noise (Kljn) Secure Key Exchange Protocol 14 January 2022
Attack Client attack remotely , this script was written for educational purposes only client attack remotely , this script was written for educational purposes only 14 January 2022
Scripts Simple script for looping a Denial Of Service (DoS) attack over one single mac address in range Simple script for looping a Denial Of Service (DoS) attack over one single mac address in range 10 January 2022
ddos DDOS Attacking scripts but with Manipulatable User agent, Referrer Array and Botnet's DDOS Attacking scripts but with Manipulatable User agent, Referrer Array and Botnet's 10 January 2022
Scripts Simple script for looping a Denial Of Service (DoS) attack over one single mac address in range Simple script for looping a Denial Of Service (DoS) attack over one single mac address in range 10 January 2022
Scripts This repo is about steps to create a effective custom wordlist in a few clicks This repo is about steps to create a effective custom wordlist in a few clicks 06 January 2022
Robust Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020) Offical implemention of Robust Superpixel-Guided Attentional Adversarial Attack (CVPR2020) 06 January 2022
Tool Python library to prevent XSS(cross site scripting attach) by removing harmful content from data A tool for removing malicious content from input data before saving data into database. 04 January 2022
Attack Implementation of an attack on a tropical algebra discrete logarithm based protocol Implementation of an attack on a tropical algebra discrete logarithm based protocol 30 December 2021
Attack A Python project for reporting DDoS attacks on your Tube-Hosing.com server to a Discord webhook A Python project for reporting DDoS attacks on your Tube-Hosing.com server to a Discord webhook 26 December 2021
Tool Multi-Process Vulnerability Tool For Python Multi-Process Vulnerability Tool For Python 20 December 2021
Attack A Python Script For Distributed Denial Of Service Attack(DDoS) A Python Script For Distributed Denial Of Service Attack(DDoS) 19 December 2021
Attack Stable Neural ODE with Lyapunov-Stable Equilibrium Points for Defending Against Adversarial Attacks Stable Neural ODE with Lyapunov-Stable Equilibrium Points for Defending Against Adversarial Attacks 19 December 2021
Tool Ant-attack: Tools hacking termux in the name ant-attack Ant-attack: Tools hacking termux in the name ant-attack 17 December 2021
Security A repository built on the Flow software package to explore cyber-security attacks on intelligent transportation systems A repository built on the Flow software package to explore cyber-security attacks on intelligent transportation systems 17 December 2021
Automation Buff A simple BOF library I wrote under an hour to help me automate with BOF attack Buff A simple BOF library I wrote under an hour to help me automate with BOF attack 13 December 2021
Logging Scan your logs for CVE-2021-44228 related activity and report the attackers Scan your logs for CVE-2021-44228 related activity and report the attackers 12 December 2021
Attack Python Toolkit containing different Cyber Attacks Tools Python Toolkit containing different Cyber Attacks Tools 11 December 2021
Scripts Python script that allows you to use onion connections to attack .onion pages or conventional pages via tor Python script that allows you to use onion connections to attack .onion pages or conventional pages via tor 11 December 2021
Attack Crack a locked pdf by dictionary attack Crack a locked pdf by dictionary attack 09 December 2021
Attack Defending against Model Stealing via Verifying Embedded External Features Defending against Model Stealing via Verifying Embedded External Features 08 December 2021
Json Wordlist attacks on Bitwarden data.json files Wordlist attacks on Bitwarden data.json files 08 December 2021
Generator Generate payloads that force authentication against an attacker machine Generate payloads that force authentication against an attacker machine 05 December 2021