Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
-
Updated
Jul 12, 2024 - Go
Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty( ͡° ͜ʖ ͡°)...
This repository contains a simple vulnerability scanner for the Terrapin attack present in the paper "Terrapin Attack: Breaking SSH Channel Integrity By Sequence Number Manipulation".
DDoS attack. Creating infinite http GET requests.
💀 🔓 CLI tool for PKCS7 padding oracle attacks
Example for the Google Chrome cache attack to inject custom code into web pages (macOS, Linux, browser version: 124.0.6367.62 and older)
Listen to the soothing sounds of attacks and anomalies detected by the Signal Sciences web protection platform.
A Simple Golang Tool That Automates OSINT For Threat Intelligence And Mapping Your Attack Surface.
A Steadybit discovery and action implementation to inject faults into various AWS services.
👊 CLI tool to parse OpenAPI and stress test each endpoint. 👊
Amateras - DHCP Starvation attack exploitation tool
A blueteam tool to simulate attacks using Atomic Red Team and other techniques.
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."