| hatRiot/clusterd |
609 |
|
0 |
0 |
about 6 years ago |
0 |
|
10 |
mit |
Python |
| application server attack toolkit |
| chris408/known_hosts-hashcat |
229 |
|
0 |
0 |
over 7 years ago |
0 |
|
0 |
|
Python |
| A guide and tool for cracking ssh known_hosts files with hashcat |
| brannondorsey/host-validation |
187 |
|
12 |
4 |
about 4 years ago |
6 |
October 28, 2018 |
2 |
mit |
JavaScript |
| Express.js middleware for "Host" and "Referer" header validation to protect against DNS rebinding attacks. |
| hatlord/snmpwn |
167 |
|
0 |
0 |
over 5 years ago |
0 |
|
0 |
mit |
Ruby |
| An SNMPv3 User Enumerator and Attack tool |
| nealharris/BREACH |
145 |
|
0 |
0 |
over 7 years ago |
0 |
|
3 |
|
C# |
| Tool that runs the BREACH attack demonstrated at BlackHat 2013. |
| GrrrDog/TLS-Redirection |
102 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
|
|
| TLS Redirection |
| thinline72/nsl-kdd |
63 |
|
0 |
0 |
over 5 years ago |
0 |
|
1 |
apache-2.0 |
Jupyter Notebook |
| PySpark solution to the NSL-KDD dataset: https://www.unb.ca/cic/datasets/nsl.html |
| JackStouffer/Violent-Python |
48 |
|
0 |
0 |
almost 12 years ago |
0 |
|
0 |
mit |
ASP |
| Code that I adapted from the "Violent Python" book |
| pentestmonkey/timing-attack-checker |
47 |
|
0 |
0 |
over 14 years ago |
0 |
|
0 |
other |
|
| Tool to help identify timing attacks |
| bfmartin/ansible-sshknownhosts |
35 |
|
0 |
0 |
over 3 years ago |
0 |
|
0 |
bsd-2-clause |
Python |
| A module for Ansible to maintain the /etc/ssh/ssh_known_hosts file. |