facebookresearch / OnlineAttacks
Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances before risking being detected.
☆14Updated 3 years ago
Related projects: ⓘ
- multiple password 'asher using Python’s hashlib☆15Updated 3 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- Pythonize Intruder Payload☆13Updated 3 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆18Updated 3 years ago
- A python module for red teams to support the continuous recon of JavaScript files and HTML script blocks in an active web application.☆13Updated 11 months ago
- A command-line application to generate random user agent strings.☆17Updated 4 years ago
- AWS Security Checks☆36Updated 6 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 3 years ago
- Collection of my slide decks & conference videos☆27Updated 3 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- Next Generation Phishing Tool For Internal / Red Teams☆35Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated last year
- ☆28Updated this week
- Paradigm is an open source tool that looks at your network landscape and determines what is actually accessible via the internet.☆19Updated last year
- Developper-proof prevention of SQL injection (java library)☆10Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 3 years ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Updated 4 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆26Updated last month
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆27Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Updated 2 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆37Updated 3 years ago
- ☆10Updated 3 years ago
- ☆27Updated this week
- WebSocket Connection Smuggler☆45Updated last year
- Burp Suite Enterprise Edition Power Tools☆16Updated last month
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago