649 / Memfixed-Mitigation-ToolLinks
DDoS mitigation tool for sending flush or shutdown commands to vulnerable Memcached servers obtained using Shodan API
☆47Updated 7 years ago
Alternatives and similar repositories for Memfixed-Mitigation-Tool
Users that are interested in Memfixed-Mitigation-Tool are comparing it to the libraries listed below
Sorting:
- Express security essentials deployment for Linux Servers☆60Updated 5 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 4 years ago
- Python tools for interacting with a DarkComet Client☆54Updated 10 years ago
- Simple Bash Rasomware for use in Cyber Exercises☆116Updated 9 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆80Updated 7 years ago
- Monitoring 'DNS' inside the Tor network☆93Updated 9 years ago
- A tool to help you manage your leaks☆34Updated 8 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- RAT / Botnet Simulator for pentest / education☆83Updated 6 years ago
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 9 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- ssh public host key scanner using shodan☆118Updated 6 years ago
- An ARP Poisoning Defender script☆42Updated 7 years ago
- A fully featured malware scanner for Linux desktops and servers.☆69Updated 3 years ago
- Telnet Honeypot☆163Updated 6 years ago
- Black Nurse DOS attack☆71Updated 8 years ago
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli…☆50Updated 7 years ago
- A Upnp exploitation tool.☆106Updated 6 years ago
- (Unofficial) Python API for cybercrime-tracker.net☆38Updated 7 years ago
- Quick proof of concept to detect a Kippo SSH honeypot instance externally☆59Updated 11 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Herramienta escrita en Python y utilizando la librería Scapy basada en Yersinia para la implementación de ataques de capa de enlace de da…☆61Updated 5 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆79Updated 7 years ago
- Proof-of-concept two-stage dropper generator that uses bits from external sources☆99Updated 8 years ago
- IPV6 MITM attack tool☆92Updated 12 years ago
- Malware samples from honeypots☆71Updated 7 years ago
- Terminal Ip Lookup Tool☆56Updated 11 years ago
- SMTP server / sinkhole for collecting spam☆45Updated 7 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆44Updated 6 years ago