Zero-attacker is an multipurpose hacking tool with over 15+ multifunction tools
TLS-Attacker is a Java-based framework for analyzing TLS libraries. It can be used to manually test TLS clients and servers or as as a software library for more advanced tools.
MHDDoS 是一款 Python DDoS 网络攻击脚本,具有 36 种攻击方法
WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr University Bochum (https://nds.rub.de/ ) and the Hackmanit GmbH...
python script for hack gmail account using brute force attack
DDos-Attack Is A Python script online Attack
翻译 - DDos-Attack Is A Python script online Attack
C++ application that uses memory and code hooks to detect packers
(DDos-attacker) Tool!
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Multi-robot formation control. An attacker attack the formation and the formation can detect the attacker, then defend the attack by topology transform.
Oracle Access Manager Unauthenticated Attacker Vulnerability CVE-2021-35587
#!/system/xbin/bash # Bersihkan Layar clear blue='\033[34;1m' green='\033[32;1m' purple='\033[35;1m' cyan='\033[36;1m' red='\033[31;1m' white='\033[37;1m' yellow='\033[33;1m' #########################...
A Password hash storage scheme that prevents an attacker from cracking passwords individually and efficiently.
A tool to check which keychain items are available to an attacker once an iOS device has been jailbroken
Analysis Financial Attacker Groups, 金融行业攻击者团伙研究
This vulnerability allows an attacker to gain unauthorized access to the firewall management space by bypassing authentication
Forced set CIO data and Control Omron PLC CPU
A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the attacker toward your honeypots
GC2 is a Command and Control application that allows an attacker to execute commands on the target machine using Google Sheet and exfiltrate data using Google Drive.
NAT Slipstreaming allows an attacker to remotely access any TCP/UDP services bound to a victim machine, bypassing the victim’s NAT/firewall, just by anyone on the victim's network visiting a website
翻译 - NAT滑动流使攻击者可以绕过受害人的NAT /防火墙远程访问受害计算机绑定的任何TCP / UDP服务,而只需受害人访问网站即可。
A list of methods to coerce a windows machine to authenticate to an attacker-controlled machine through a Remote Procedure Call (RPC) with various protocols.