649 / Memfixed-Mitigation-Tool
DDoS mitigation tool for sending flush or shutdown commands to vulnerable Memcached servers obtained using Shodan API
☆47Updated 7 years ago
Alternatives and similar repositories for Memfixed-Mitigation-Tool:
Users that are interested in Memfixed-Mitigation-Tool are comparing it to the libraries listed below
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Download and Inject code into Google Chrome extensions☆13Updated 7 years ago
- Express security essentials deployment for Linux Servers☆58Updated 4 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆37Updated 7 years ago
- A Upnp exploitation tool.☆105Updated 5 years ago
- An ARP Poisoning Defender script☆42Updated 6 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- MemcacheD Proof of Concept☆22Updated 7 years ago
- Vocabulary Scraper script used in FLARE's analysis of Russian-language Carbanak source code☆37Updated 5 years ago
- Create a DDOS attack using SNMP servers☆44Updated 11 years ago
- DNS Enumeration with Asynchronicity☆46Updated 6 years ago
- Malware samples from honeypots☆71Updated 7 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆46Updated 6 years ago
- Samurai Email Discovery - SED is a email discovery framework that grabs emails via google dork, company name, or domain name.☆84Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆63Updated 5 years ago
- a fully python Diffie-Hellman Library☆51Updated 7 years ago
- Simple development DNS server written in python☆26Updated 7 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Dr. Mine is a node script written to aid automatic detection of in-browser cryptojacking.☆47Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- Openssh backdoor found with a ssh honeypot☆27Updated 8 years ago
- Automate ARP poisoning, ssltrip, and ettercap.☆45Updated 8 years ago
- Monitoring 'DNS' inside the Tor network☆92Updated 8 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆98Updated 7 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Terminal Ip Lookup Tool☆56Updated 10 years ago