DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
☆1,387Dec 2, 2022Updated 3 years ago
Alternatives and similar repositories for Memcrashed-DDoS-Exploit
Users that are interested in Memcrashed-DDoS-Exploit are comparing it to the libraries listed below
Sorting:
- DDoS Amplification Tool☆1,003Apr 25, 2023Updated 2 years ago
- Automated Mass Exploiter☆5,211May 22, 2023Updated 2 years ago
- Create a DDOS attack using NTP servers☆602Dec 18, 2016Updated 9 years ago
- UFONet - Denial of Service Toolkit☆2,433Aug 23, 2024Updated last year
- An evil RAT (Remote Administration Tool) for macOS / OS X.☆2,392Feb 10, 2021Updated 5 years ago
- This repo consists of various DDoS scripts, collected from internet. Layer-4 and Layer-7 levels can be targeted using these scripts.☆381Apr 4, 2021Updated 4 years ago
- some sort of ddos-tools☆726Nov 1, 2024Updated last year
- Hammer DDos Script - Python 3☆1,771Aug 1, 2025Updated 6 months ago
- BoNeSi - the DDoS Botnet Simulator☆756Feb 3, 2026Updated 3 weeks ago
- An open-source post-exploitation framework for students, researchers and developers.☆9,431Feb 20, 2026Updated last week
- A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks☆1,437Nov 3, 2018Updated 7 years ago
- Abusing Certificate Transparency logs for getting HTTPS websites subdomains.☆2,090Jan 2, 2024Updated 2 years ago
- DDos-Attack Is A Python script online Attack☆1,759Nov 15, 2024Updated last year
- Exploitation Framework for Embedded Devices☆12,985Jun 10, 2025Updated 8 months ago
- Find exploits in local and online databases instantly☆1,809Sep 27, 2021Updated 4 years ago
- massive SQL injection vulnerability scanner☆1,229Aug 14, 2018Updated 7 years ago
- Auto Scanning to SSL Vulnerability☆634Dec 12, 2020Updated 5 years ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆306Oct 27, 2017Updated 8 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆729Nov 19, 2017Updated 8 years ago
- Know the dangers of credential reuse attacks.☆2,090Dec 9, 2025Updated 2 months ago
- Vulnerability Labs for security analysis☆1,172Mar 10, 2021Updated 4 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆124Jun 22, 2018Updated 7 years ago
- Powerful DDoS Attack☆289Jul 21, 2024Updated last year
- UAC bypass, Elevate, Persistence methods☆2,739Feb 13, 2023Updated 3 years ago
- A POC for the Huge Dirty Cow vulnerability (CVE-2017-1000405)☆201Nov 30, 2017Updated 8 years ago
- Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network☆2,508Mar 26, 2024Updated last year
- AntiVirus Evasion Tool☆1,741Apr 23, 2025Updated 10 months ago
- Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and et…☆11,043Mar 17, 2024Updated last year
- DDoS attacks over Tor☆392Jul 27, 2023Updated 2 years ago
- Most advanced XSS scanner.☆14,773Apr 26, 2025Updated 10 months ago
- Patator is a multi-purpose brute-forcer, with a modular design and a flexible usage.☆3,853May 20, 2025Updated 9 months ago
- X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter☆1,713Oct 8, 2023Updated 2 years ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,813Jan 19, 2020Updated 6 years ago
- My collection of metasploit auxiliary post-modules☆192May 25, 2019Updated 6 years ago
- Attack Surface Management Platform☆9,418Feb 15, 2026Updated last week
- Auto Root Exploit Tool☆536Jun 15, 2023Updated 2 years ago
- The legacy Exploit Database repository - New repo located at https://gitlab.com/exploit-database/exploitdb☆7,846Nov 10, 2022Updated 3 years ago
- Proof-of-Concept exploits for CVE-2017-11882☆496Nov 29, 2017Updated 8 years ago
- DKMC - Dont kill my cat - Malicious payload evasion tool☆1,418Jul 20, 2020Updated 5 years ago