0xICF / BeeDoS
Behavioral Application Denial of Service (DoS) attack tool
☆13Updated 9 years ago
Related projects: ⓘ
- ☆12Updated this week
- Performs method enumeration and interrogation against flash remoting end points.☆36Updated 4 years ago
- ☆17Updated this week
- ☆27Updated 8 years ago
- This script will try to find a domains subdomains by using google dorking. It will never connect to the site it is researching.☆19Updated 8 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 13 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Updated 3 years ago
- ☆19Updated this week
- Pastenum is a text dump enumeration tool.☆14Updated 10 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- ☆33Updated this week
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- ☆11Updated this week
- ☆17Updated this week
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 9 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- ☆23Updated this week
- ☆23Updated this week
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 8 years ago
- ☆51Updated this week
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- ☆68Updated this week
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆40Updated 5 years ago
- ☆18Updated this week
- Collection of different ways to execute code outside of the expected entry points☆15Updated 11 years ago
- thedumpster is a tool which does passive recon using google and its dorks against a particular domain.☆11Updated 9 years ago
- µphisher spear phishing tool (reference implementation)☆38Updated 4 years ago
- Universal stack-based buffer overfow exploitation tool☆22Updated 10 years ago
- w3af packaging for Kali distribution☆24Updated 8 years ago