DanielRTeixeira / R.U.D.Y.
R-U-Dead-Yet, or RUDY for short, implements the generic HTTP DoS attack via long form field submissions.
☆23Updated 8 years ago
Alternatives and similar repositories for R.U.D.Y.:
Users that are interested in R.U.D.Y. are comparing it to the libraries listed below
- some python3 functions to add spreading features to any python backdoor☆51Updated 8 years ago
- SQLi Tool/SQL Injection/Hijacker☆42Updated 8 years ago
- Red Login: SSH Brute-force Tools☆102Updated 6 years ago
- HTTP botnet☆60Updated 8 years ago
- Check local or remote list of DNS servers for suitability in DNS Amplification DoS.☆47Updated 5 years ago
- Create a worm that bruteforces SSH and "infect" the system.☆25Updated 7 years ago
- Check if a IP is from tor or is a malicious proxy☆56Updated 3 years ago
- A simple python reverse shell written just for fun.☆64Updated last year
- Small backdoor using cookie.☆59Updated 8 years ago
- Automated Tools Pentest☆7Updated last year
- Python script for trying default passwords for some TP-Link Hotspots☆35Updated 3 years ago
- Loki.Rat is a fork of the Ares RAT, it integrates new modules, like recording , lockscreen , and locate options. Loki.Rat is a Python Rem…☆73Updated 2 years ago
- Vault 7: CIA Hacking Tools Revealed☆15Updated 7 years ago
- A few SQL and XSS attack tools☆40Updated 5 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- OpenSSH 6.7p1 backdoor kit☆21Updated 10 years ago
- A simple XSS finding tool☆109Updated 6 years ago
- Python virus that will make your pc paralyzed once it opened :D☆46Updated 3 years ago
- Multi-threaded web application directory bruteforcer☆25Updated 5 years ago
- Simple Remote Access Trojan☆21Updated 8 years ago
- Automatic remote/local file inclusion vulnerability analysis and exploit tool☆61Updated 5 years ago
- Gathering Email Information Tool☆35Updated 7 years ago
- The Python Password-Protected Obfuscator☆34Updated 5 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 6 years ago
- Mass malicious script dump/Malware src dump☆56Updated 8 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆49Updated 7 years ago
- Remote Access Trojan(RAT), Miner, DDoS☆32Updated 8 years ago
- Listing subdomains about a main domain☆58Updated 6 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 6 years ago
- Windows/Linux - ReverseShellBackdoor Framework☆48Updated 5 years ago