Projects in Awesome Lists tagged with attacks
A curated list of projects in awesome lists tagged with attacks .
https://github.com/firehol/blocklist-ipsets
ipsets dynamically updated with firehol's update-ipsets.sh script
abuses attacks blocklists command-and-control ipset ipset-lists malware
Last synced: 14 May 2025
https://github.com/six2dez/pentest-book
attacks hacking oscp pentesting pentests security wiki
Last synced: 24 Mar 2025
https://github.com/vanhauser-thc/thc-ipv6
IPv6 attack toolkit
attacklab attacks denial-of-service ipv6 ipv6-research man-in-the-middle man-in-the-middle-attack penetration-testing thc
Last synced: 16 May 2025
https://github.com/Tmpertor/Raven-Storm
Raven-Storm is a powerful DDoS toolkit for penetration tests, including attacks for several protocols written in python. Takedown many connections using several exotic and classic protocols.
attacks botnet ddos ddos-attack-tools ddos-attacks ddos-script ddos-tool denial-of-service dos mitm penetration-tests pentesting protection python security security-tools server stress-testing termux web-security
Last synced: 30 Apr 2025
https://github.com/lockgit/hacking
Hacker, ready for more of our story ! 🚀
attack attacker attacks cracker geek hack hacker hacking hacking-tool poc scanner security security-research security-vulnerability tool tools vulnerabilities vulnerability vulnerability-scanners
Last synced: 13 Apr 2025
https://github.com/LockGit/Hacking
Hacker, ready for more of our story ! 🚀
attack attacker attacks cracker geek hack hacker hacking hacking-tool poc scanner security security-research security-vulnerability tool tools vulnerabilities vulnerability vulnerability-scanners
Last synced: 13 Mar 2025
https://github.com/borestad/blocklist-abuseipdb
Aggregated AbuseIPDB blocklists with worst IPv4 & IPv6 offenders (~99% confidence)
abuseipdb attack-prevention attacks blacklist blacklists blocklist blocklists firewall ipblocklist iplist iplists ipset ipset-lists ipsets ipsum iptables maltrail malware netfilter
Last synced: 20 Jan 2026
https://github.com/hbaniecki/adversarial-explainable-ai
💡 Adversarial attacks on explanations and how to defend them
adversarial adversarial-attacks adversarial-examples adversarial-machine-learning attacks counterfactual deep defense evaluation explainability explainable-ai iml interpretability interpretable interpretable-machine-learning model responsible-ai robustness security xai
Last synced: 25 Mar 2025
https://github.com/MystenLabs/ed25519-unsafe-libs
List of unsafe ed25519 signature libs
attacks blockchain cryptography ed25519 vulnerabilities
Last synced: 18 Apr 2025
https://github.com/mystenlabs/ed25519-unsafe-libs
List of unsafe ed25519 signature libs
attacks blockchain cryptography ed25519 vulnerabilities
Last synced: 09 Apr 2025
https://github.com/aasthayadav/compsecattacklabs
Contains Attack labs
attacks c security-vulnerability shellcode socket-programming
Last synced: 21 Aug 2025
https://github.com/aasthayadav/CompSecAttackLabs
Contains Attack labs
attacks c security-vulnerability shellcode socket-programming
Last synced: 25 Mar 2025
https://github.com/r3dhulk/hulk
hulk is a ddos attacking tool
attack attacks blackhat-python blackhatethicalhacking blackhatpython ddos ddos-attack ddos-attacks ddos-tool ddoser ddoser-tool ethical-hacking ethical-hacking-tools fun funwithpython hulk python pythonforethicalhacking stress-testing websitehacking
Last synced: 05 Apr 2025
https://github.com/X-Vector/X-RSA
Cryptography Tool | RSA Attacks
attack attacks bugbounty bugcrowd cryptography ctf hackerone hackerrank python rsa rsa-attacks rsa-tool tools
Last synced: 30 Apr 2025
https://github.com/ImpostorKeanu/BruteLoops
Protocol agnostic online password guessing API.
attacks brute-force-attacks bruteforce-attacks pentesting sqlite-database
Last synced: 07 Sep 2025
https://github.com/borestad/firehol-mirror
Cron caching of https://iplists.firehol.org (without private networks a.k.a RFC1918)
abuses attacks blacklist blacklist-ips blocklist-ipsets blocklists cron cronjob firehol firehol-blocklist firehol-blocklist-ipsets firehol-level1 iplists ipranges ipset ipset-lists ipsets malware mirror
Last synced: 20 Jan 2026
https://github.com/xh4h/loki
The Dependency Confusion vulnerability scanner and autoexploitation tool to help identifying and mitigating supply chain attacks
attacks chain confusion dependency exploit migitation poc supply vulnerability-scanners
Last synced: 13 Aug 2025
https://github.com/LucaBonamino/BruteSniffing_Fisher
hacking tool
attacks bruteforce brutesniffing-fisher cloning ethical-hacking fishing hacking information-gathering proxychains python set sniffing social-engeneering-toolkit socket
Last synced: 09 Jul 2025
https://github.com/demining/blockchain-attack-vectors
Blockchain Attack Vectors & Vulnerabilities to Smart Contracts
attack attacker attacks bitcoin blockchain blockchain-technology cryptocurrency ethereum exploit exploiting exploiting-vulnerabilities hack hacking smart-contracts vulnerabilities vulnerability vulnerability-scanners
Last synced: 25 Jun 2025
https://github.com/philipmur/auto-webpage-login-password-by-force
A simple C# GUI interface that will allow Automatic login to a web page and can brute force the passwords on most web pages.
attack-prevention attacks auto-logon automation csharp-code force proxies proxy proxylist web-bot website
Last synced: 09 Apr 2025
https://github.com/moveyourdigital/cloudflare-worker-csp-nonce
A Cloudflare worker to generate and inject Content Security Policy nonces in returned HTML pages.
attacks cloudflare cloudflare-worker content-security-policy nonces s3-website static-website whitelist
Last synced: 21 Mar 2025
https://github.com/qeeqbox/cyber-attacks
A collection of attacks metadata that were used in my previous pen-test tools
Last synced: 05 Mar 2025
https://github.com/hunters-org/hunter-kit
Hunter-Kit is a cross platform security toolkit and framework that can automate most of the pentesting engagement from the recon to reporting phase
attacks autmation frameworks pentesting-tools reconnaissance security security-tools toolkit
Last synced: 06 Aug 2025
https://github.com/shashankskagnihotri/cospgd
The official repository for CosPGD: a unified white-box adversarial attack for pixel-wise prediction tasks.
adversarial adversarial-att attacks benchmarking benchmarking-functions depth-estimation image-deblurring image-denoising image-restoration optical-flow pixel-wise pixel-wise-classification pixel-wise-regression segmentation semantic semantic-segmentation unet-pytorch unet-segmentation vision
Last synced: 14 Jan 2026
https://github.com/anvilsecure/symlink-secure-boot-vm
VM demonstration various symlink and hard link attacks against secure boot. See the whitepaper at: https://www.anvilventures.com/blog/defeating-secure-boot-with-symlink-attacks.html
attacks boot hacking secure secureboot security symlinks vms whitepaper
Last synced: 07 Jan 2026
https://github.com/ispras/wibe
An Extensible Open Source Framework for Evaluating Imperceptibility and Robustness of Digital Watermarks for Generated Images
attacks framework generated-by-ai imperceptibility robustness watermarking
Last synced: 20 Sep 2025
https://github.com/demining/list-of-cryptocurrency-exchange-hacks
We have compiled an exhaustive list of cryptocurrency exchange hacks [ 2011 – 2022 ] – you will be amazed at how much has been stolen over the years
attack attacks binance bitcoin bitcoin-wallet cryptocurrency exchange hack hacker hacker-news hackernews hacking
Last synced: 30 Oct 2025
https://github.com/demining/teslabrainwallet
Tesla BrainWallet traps from Bitcoin wallets beware of phishing and popular passphrases
attack attacks bitcoin bitcoin-wallet blockchain brainwallet brainwallet-recover brainwallet-uniqe btc cryptocurrencies cryptography ecdsa ecdsa-cryptography ecdsa-signature elliptic-curves elliptic-curves-cryptography privatekey privatekeys secp256k1 vulnerability
Last synced: 08 Oct 2025
https://github.com/demining/cold-and-hot-wallets
Cold Wallets and Hot Wallets how to find vulnerabilities and eliminate various attacks on the Blockchain
attack attacker attacks bitcoin bitcoin-transaction bitcoin-wallet blockchain coldwallet coldwaters cryptocurrency exploit exploits hack hacking vulnerabilities vulnerability
Last synced: 01 Mar 2025
https://github.com/demining/physical-bitcoin-attacks
All known physical attacks on Bitcoin and other cryptocurrencies from 2014 to 2022
attack attacks bitcoin bitcoin-wallet cryptocurrencies cryptocurrencies-coins cryptocurrencies-market-cap
Last synced: 19 Sep 2025
https://github.com/drilonaliu/cryptography
A cryptography package with simplifed versions of AES and SHA-1, RSA, HMAC; featuring attacks, block ciphers and digital signature schemes.
aes attacks block-ciphers cryptography encryption hash rsa sha-1
Last synced: 07 Oct 2025
https://github.com/smartibase/lattice-attack.ipynb
lattice attack.ipynb - One weak transaction in ECDSA on the Bitcoin blockchain and with the help of Lattice Attack we received a Private Key to BTC coins
attack attacker attacks bitcoin crack cracking cracking-hash cracking-hashes cracking-password cryptocurrency hack hacking hacking-tool haking-tools lattice-attack latticeattack
Last synced: 24 Oct 2025
https://github.com/demining/defi-attacks
DeFi Attacks & Exploits all the biggest cryptocurrency thefts from 2021 to 2022
attack attacks attacks-threats-vulnerabilites bitcoin bitcoin-wallet blockchain defi defichain ethereum exploit exploits
Last synced: 03 May 2025
https://github.com/duhow/blocklist-ipsets
List of detected IP addresses as offenders.
abuses attacks blocklists command-and-control ipset ipset-lists
Last synced: 20 Feb 2025
https://github.com/tianmutnt/crash-browser
Browser Crash Test - Educational Purpose Only
attacks browser crash demo demonstration educational educational-purposes-only network-security protection resource-exhaustion test test-tools
Last synced: 17 Jun 2025
https://github.com/bethanyuo/solidity-security
Exercises pertaining to various Smart Contract vulnerabilities.
attacks honeypot security short-address smart-contracts vulnerabilities
Last synced: 19 Jul 2025
https://github.com/jadsongmatos/cryptopals
attacks challenges ciphers cryptography decryption encryption hashes security
Last synced: 26 Feb 2025