A DNS rebinding attack framework.
-
Updated
Jun 17, 2024 - JavaScript
A DNS rebinding attack framework.
Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)
Written in Electron for Linux.
A system like norse attack map.
:(){ :|: };: 💣 Fork bombs (wabbits) in many languages. Spot them before executing any code so that you can prevent yourself from accidentally nuking your device.
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penet…
A module for modifying certain sheet functions on Foundry VTT Character sheets for D&D 5th Edition.
One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins
Official implementation of paper: DrAttack: Prompt Decomposition and Reconstruction Makes Powerful LLM Jailbreakers
Anti Shoulder Surfing Attack Platform (ASSAP)
Cryptanalysis of the DAO exploit & Multi-Stage Attack
Find used seeds in blockchain
We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen over the years
Ultimate Container Security Track
⛔️deprecated and replaced by https://github.com/marmicode/websheep
Vulnerability CVE-2021-44228 allows remote code execution without authentication for several versions of Apache Log4j2 (Log4Shell). Attackers can exploit vulnerable servers by connecting over any protocol, such as HTTPS, and sending a specially crafted string.
Rules that relate to checking the SSL configuration of each individual resolved server from the domain to ensure locked down config with the broadest compatibility
Add a description, image, and links to the attack topic page so that developers can more easily learn about it.
To associate your repository with the attack topic, visit your repo's landing page and select "manage topics."