Attack Attack SQL Server through gopher protocol Attack SQL Server through gopher protocol 25 November 2021
PyTorch Geometrically Adaptive Dictionary Attack on Face Recognition Geometrically Adaptive Dictionary Attack on Face Recognition 23 November 2021
Protocol Attack SQL Server through gopher protocol Attack SQL Server through gopher protocol 23 November 2021
Finger Fingerprint Presentation Attack Detector Using Global-Local Model Fingerprint Presentation Attack Detector Using Global-Local Model 22 November 2021
Attack Using LSTM to detect spoofing attacks in an Air-Ground network Using LSTM to detect spoofing attacks in an Air-Ground network 21 November 2021
OAuth Abusing Microsoft 365 OAuth Authorization Flow for Phishing Attack Abusing Microsoft 365 OAuth Authorization Flow for Phishing Attack 20 November 2021
Attack Find which of your go lang direct GitHub dependencies is susceptible to ChainJacking attack Find which of your go lang direct GitHub dependencies is susceptible to ChainJacking attack 17 November 2021
Attack A Simple Software For Ddos Attack Written In Python A Simple Software For Ddos Attack Written In Python 14 November 2021
Machine Learning FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack FCA: Learning a 3D Full-coverage Vehicle Camouflage for Multi-view Physical Adversarial Attack 12 November 2021
Attack An Open-Source and extensible framework to detect and prevent dependency confusion leakage and potential attacks An Open-Source and extensible framework to detect and prevent dependency confusion leakage and potential attacks 10 November 2021
Attack ??AliCybeRR?? Ddoser For Attack L4 & L7 Site ??AliCybeRR?? Ddoser For Attack L4 & L7 Site 07 November 2021
Password A python3 wifi brute-force attack using the 100k most common passwords (2021) A python3 wifi brute-force attack using the 100k most common passwords (2021) 04 November 2021
Games Arcade-like space shooter game written entirely in python Arcade-like space shooter game written entirely in python 04 November 2021
Generator Generate malicious files using recently published homoglyphic-attack Generate malicious files using recently published homoglyphic-attack 03 November 2021
Attack Usage of frwk_51pwn for attacking targets without prior mutual consent is illegal Usage of frwk_51pwn for attacking targets without prior mutual consent is illegal 01 November 2021
GUI D-dos attack GUI tool written in python using tkinter module D-dos attack GUI tool written in python using tkinter module 31 October 2021
Attack A repository to detect the ARP spoofing in any devices and prevent Man in the Middle(MITM) attack using Python3 A repository to detect the ARP spoofing in any devices and prevent Man in the Middle(MITM) attack using Python3 30 October 2021
Attack A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environment A Proof-of-Concept Layer 2 Denial of Service Attack that disrupts low level operations of Programmable Logic Controllers within industrial environment 24 October 2021
Security A security tool can perform DoS attack by enforcing the DHE key exchange A security tool can perform DoS attack by enforcing the DHE key exchange 24 October 2021
Attack A toolkit wich provides Denial-of-service attacks, SMS attacks and more Bark Toolkit is a toolkit wich provides Denial-of-service attacks, SMS attacks and more 24 October 2021
Tool A DoS tools that sends attacks using Socks5 & Socks4 A DoS tools that sends attacks using Socks5 & Socks4 18 October 2021
Transformer Boosting Transferability through Enhanced Momentum Boosting Transferability through Enhanced Momentum 18 October 2021
Attention Self-Attention Context Network: Addressing the Threat of Adversarial Attacks for Hyperspectral Image Classification Self-Attention Context Network: Addressing the Threat of Adversarial Attacks for Hyperspectral Image Classification 18 October 2021
Deep Learning NEEDLE: Towards Non-invertible Backdoor Attack to Deep Learning Models NEEDLE: Towards Non-invertible Backdoor Attack to Deep Learning Models 13 October 2021
Attack Zero attacker Tools for purpose of ethical hacking and discord tools Zero attacker Tools for purpose of ethical hacking and discord tools 09 October 2021
Attack Brute force attack tool for Azure AD Autologon/Seamless SSO Brute force attack tool for Azure AD Autologon/Seamless SSO 02 October 2021
Hacking A python library which was built to add payload position support and Sniper/Clusterbomb attack types into Turbo Intruder A python library which was built to add payload position support and Sniper/Clusterbomb attack types into Turbo Intruder 30 September 2021
Attack UDP-ATTACK, sends over 200mbs+ DOS, simple python script UDP-ATTACK, sends over 200mbs+ DOS, simple python script 30 September 2021
Hacking Fetching data for members such as location and region With the attack Fetching data for members such as location and region With the attack 30 September 2021
Attack A simple ddos attack tool using python A simple ddos attack tool using python 29 September 2021
Attack Ad2Attack: Adaptive Adversarial Attack for Real-Time UAV Tracking Ad2Attack: Adaptive Adversarial Attack for Real-Time UAV Tracking 28 September 2021
Attack A Python framework for adversarial attacks, data augmentation, and model training in NLP A Python framework for adversarial attacks, data augmentation, and model training in NLP 22 September 2021
Attack Efficient Sparse Attacks on Videos using Reinforcement Learning Efficient Sparse Attacks on Videos using Reinforcement Learning 21 September 2021
Freqtrade Learnable Multi-level Frequency Decomposition and Hierarchical Attention Mechanism for Generalized Face Presentation Attack Detection Learnable Multi-level Frequency Decomposition and Hierarchical Attention Mechanism for Generalized Face Presentation Attack Detection 21 September 2021
Attack Single Node Injection Attack against Graph Neural Networks Single Node Injection Attack against Graph Neural Networks 13 September 2021
Attaching RDA: Robust Domain Adaptation via Fourier Adversarial Attacking RDA: Robust Domain Adaptation via Fourier Adversarial Attacking 13 September 2021
Attack Preimage attack against NeuralHash in python Find target hash collisions for Apple's NeuralHash perceptual hash function. 27 August 2021
Security Censors pose a threat to the entire Internet In this work, we show that censoring middleboxes and firewalls can be weaponized by attackers to launch unprecedented reflected denial of service attacks. 25 August 2021
Hacking A vehicle network analysis and attack tool a tool built to analyze the log files to find out unique datasets automatically and able to connect to simple user interfaces such as Telegram. 23 August 2021
Natural Language Processing Unified Multilingual Robustness Evaluation Toolkit for Natural Language Processing Unified Multilingual Robustness Evaluation Toolkit for Natural Language Processing 19 August 2021
Attack Phishing Abusing Microsoft 365 OAuth Authorization Flow Abusing Microsoft 365 OAuth Authorization Flow for Phishing Attack 18 August 2021
Hacking Emulate and Dissect MSF and other attacks in python The tool has been presented at Black-Hat Arsenal USA 2021 14 August 2021
Neural Network Defending Graph Neural Networks against Adversarial Attacks GNNGuard: Defending Graph Neural Networks against Adversarial Attacks 10 August 2021
Attack Stronger and Faster Wasserstein Adversarial Attacks With Python Stronger and Faster Wasserstein Adversarial Attacks 05 August 2021