Showing 201-220 of 265 projects
ThePhish is an automated tool for analyzing and detecting phishing emails, providing cybersecurity professionals with a comprehensive solution.
This project appears to be related to the KRACK attack, which is a vulnerability in the WPA2 protocol, rather than a developer discovery platform for vibe coders.
An active defense and EDR software to empower blue teams and detect security threats on Windows systems.
A multi-threaded PDF password cracking utility with password format builders and dictionary attacks.
A set of tools for creating and injecting malicious image payloads for web attacks.
This project allows you to create up to a thousand WiFi access points with custom SSIDs, useful for security testing.
This book provides a comprehensive guide to understanding and exploiting the internals of the glibc heap for security researchers.
A toolkit for auditing and exploiting Cross-Site Request Forgery (CSRF) vulnerabilities in web applications.
PoC for the Zerologon vulnerability, which allows an attacker to completely compromise a Windows domain controller.
A reporting tool for Blue and Purple Teams using Bloodhound and Neo4j
A curated collection of periodic cyber security newsletters covering the latest news, research, and best practices.
Generates statistically likely username lists for password attacks and security testing
This is a shell script for attacking wireless connections using Kali Linux tools.
A Go-based utility for penetration testing and network security, featuring DHCP, DNS, and other network spoofing capabilities.
A comprehensive cheatsheet for Red Team activities and penetration testing techniques.
A DNS rebinding attack framework written in JavaScript for security research and testing.
LSTAR is a comprehensive post-exploitation plugin for CobaltStrike, a popular penetration testing framework.
A JavaScript library for building AI-powered tools and applications that help developers leverage AI effectively.
Advanced Instagram bruteforce attack script in Python
A toolkit for creating various payloads, powershell attacks, and launching listeners for Human Interface Devices (Teensy).
Get weekly updates on trending AI coding tools and projects.