facebookresearch / OnlineAttacks
Study of a hypothetical attack scenario where an attacker corrupts images that are fed into an AI system, and has only a few chances before risking being detected.
☆14Updated 3 years ago
Alternatives and similar repositories for OnlineAttacks
Users that are interested in OnlineAttacks are comparing it to the libraries listed below
Sorting:
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆18Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Collection of my slide decks & conference videos☆27Updated 4 years ago
- Autowin is a framework that helps organizations simulate custom attack scenarios in order to improve detection and response capabilities.☆20Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago
- WebSocket Connection Smuggler☆45Updated 2 years ago
- pwncat windows c2 components☆19Updated 3 years ago
- Automated Recon Framework☆24Updated 4 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆28Updated 3 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆28Updated 9 months ago
- Install and upgrade projectdiscovery tools☆10Updated 3 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- Red team oriented key finder and correlator☆16Updated last year
- Recon tool for URLs discovery☆11Updated 10 months ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆38Updated 4 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 4 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- A collection of BBRF agents that can be deployed to AWS lambda☆22Updated 6 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- SNMP enumeration script☆13Updated 5 years ago
- dev level ;-)☆10Updated 6 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago