DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
☆1,393Dec 2, 2022Updated 3 years ago
Alternatives and similar repositories for Memcrashed-DDoS-Exploit
Users that are interested in Memcrashed-DDoS-Exploit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- DDoS Amplification Tool☆1,018Apr 25, 2023Updated 3 years ago
- This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.☆387Apr 4, 2021Updated 5 years ago
- UFONet - Denial of Service Toolkit☆2,459Aug 23, 2024Updated last year
- Create a DDOS attack using NTP servers☆602Dec 18, 2016Updated 9 years ago
- some sort of ddos-tools☆731Nov 1, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Hammer DDos Script - Python 3☆1,794Aug 1, 2025Updated 9 months ago
- DDos-Attack Is A Python script online Attack☆1,776Mar 30, 2026Updated last month
- DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers without Shodan Api☆14May 5, 2021Updated 5 years ago
- Automated Mass Exploiter☆5,239May 22, 2023Updated 2 years ago
- DDoS mitigation tool for sending flush or shutdown commands to vulnerable Memcached servers obtained using Shodan API☆47Mar 21, 2018Updated 8 years ago
- BoNeSi - the DDoS Botnet Simulator☆771Feb 3, 2026Updated 3 months ago
- ☆19Mar 29, 2018Updated 8 years ago
- Powerful DDoS Attack☆296Jul 21, 2024Updated last year
- MemcacheD Proof of Concept☆22Mar 6, 2018Updated 8 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,407Feb 10, 2021Updated 5 years ago
- List of all Memcached Servers that are vulnerable to DDoS attack vector☆10Dec 21, 2020Updated 5 years ago
- The powerful DDoS script of vBooter.info☆138Feb 3, 2019Updated 7 years ago
- Low bandwidth DoS tool. Slowloris rewrite in Python.☆2,780Jun 1, 2024Updated last year
- DDoS attacks over Tor☆398Jul 27, 2023Updated 2 years ago
- Memcache 反射DDOS攻击脚本经供学习参考使用☆294Mar 2, 2018Updated 8 years ago
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,465Nov 3, 2018Updated 7 years ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,467Updated this week
- Exploitation Framework for Embedded Devices☆13,109May 5, 2026Updated last week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- 🔫 Red DDoS Tool is -THE BEST- tool for DDoS attacks.☆448May 4, 2026Updated last week
- DDoS Script (DDoS Panel) with Multiple Bypass ( Cloudflare UAM,CAPTCHA,BFM,NOSEC / DDoS Guard / Google Shield / V Shield / Amazon / etc..…☆881Jul 25, 2023Updated 2 years ago
- DDOS tool in python.☆146Jun 17, 2024Updated last year
- Tor's hammer. Slow post DDOS tool written in python.☆337Apr 23, 2022Updated 4 years ago
- Using Socks4/5 or http proxies to make a multithreading Http-flood/Https-flood (cc) attack.☆1,069Oct 15, 2023Updated 2 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆125Jun 22, 2018Updated 7 years ago
- Yet another one hard-hitting tool to run HTTP stress tests 🌌☆173May 18, 2021Updated 4 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆2,087Jan 2, 2024Updated 2 years ago
- Know the dangers of credential reuse attacks.☆2,107Dec 9, 2025Updated 5 months ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- massive SQL injection vulnerability scanner☆1,229Aug 14, 2018Updated 7 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,542Mar 26, 2024Updated 2 years ago
- Find exploits in local and online databases instantly☆1,818Sep 27, 2021Updated 4 years ago
- Explore RootSec's DDOS Archive, featuring top-tier scanners, powerful botnets (Mirai & QBot) and other variants, high-impact exploits, ad…☆1,021Oct 3, 2024Updated last year
- Akamai Reflective DDoS Tool - Attack the origin host behind the Akamai Edge hosts and DDoS protection offered by Akamai services.☆264Jun 25, 2020Updated 5 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆495Nov 29, 2017Updated 8 years ago
- Research on UDP/TCP amplification vectors, payloads and mitigations against their use in DDoS Attacks☆395Dec 14, 2024Updated last year