LMNx9-JOHNY / D-DOS-Attack-24View external linksLinks
☆12Jan 17, 2026Updated last month
Alternatives and similar repositories for D-DOS-Attack-24
Users that are interested in D-DOS-Attack-24 are comparing it to the libraries listed below
Sorting:
- Android devices using ADB via the Shodan API. It prompts the user for a command payload, then establishes TCP connections to devices with…☆14Jan 7, 2026Updated last month
- DarkStar is a Premium Hacking Tools. You can buy by contacting me☆26Oct 27, 2024Updated last year
- Network scan tool for host and service discovery. Written in Rust.☆20Oct 12, 2025Updated 4 months ago
- Tyrant is a malicious tool used for penetration testing and remote control persistence.☆38Feb 3, 2025Updated last year
- This Python script aims to enhance your online privacy and security by automatically rotating your DNS settings at a set interval (defaul…☆35Jan 31, 2026Updated 2 weeks ago
- Phishing tool script which generate phishing websites with a link to send to victim, the link genrated comes together with a QR code.Medu…☆129Updated this week
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- LulzDDOS TOOL- powerful DDoS toolkit for penetration tests☆34Aug 2, 2023Updated 2 years ago
- Educational cybersecurity tool that visualizes network attacks on a 3D ASCII globe. Real-time firewall log analysis with IP geolocation…☆96Oct 14, 2025Updated 4 months ago
- Web Recon Tool 🔍 An efficient reconnaissance tool for security researchers, ethical hackers, and developers to gather vital information …☆25Nov 17, 2024Updated last year
- A tool programmed to shorten links/mask links☆11Oct 17, 2021Updated 4 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- Tool for automate bug hunting process 🔍 --> 🍭☆47Jun 27, 2025Updated 7 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆13Aug 20, 2024Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆17Mar 14, 2025Updated 11 months ago
- Module PMKIDAttack for WiFi Pineapple☆12Oct 6, 2022Updated 3 years ago
- USB rubber ducky reverse shell with disabling windows defender☆11Apr 17, 2021Updated 4 years ago
- A C2 framework inspired by anime, made in python.☆12Feb 8, 2026Updated last week
- Redefining Web Operating Systems☆18Sep 22, 2025Updated 4 months ago
- Script Open Source Facebook Crack Indonesia👾💥☆12Jan 6, 2024Updated 2 years ago
- multi-threaded script uses VirusTotal and AbuseIPDB APIs and generate an excel with all needed data☆10Mar 14, 2023Updated 2 years ago
- Multi-threaded port scanner written in C++☆13Dec 17, 2019Updated 6 years ago
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Updated this week
- Remake Of The USB Rubber Ducky In Python With Better Features. Steals IPv4+IPv6 And Other IPs, And Browsing History From: Brave, Microsof…☆14Oct 5, 2024Updated last year
- Esta es una extensión del proyecto original de Avilla Forensics☆12Nov 18, 2025Updated 2 months ago
- A simple Arduino Library to send message on Discord using webhook☆14Feb 25, 2025Updated 11 months ago
- Show Windows CPU performance, memory and temperature information on an ESP32 driven display☆10Sep 21, 2025Updated 4 months ago
- USB Rubber Ducky Scripts and other Lovely Programs.☆12Oct 26, 2021Updated 4 years ago
- ARP Exploitation in Python☆10Feb 19, 2017Updated 8 years ago
- NetFuzzer is a comprehensive network security assessment tool for internal and external network components, including Host Machines, Fire…☆15Aug 4, 2025Updated 6 months ago
- Scripts and Tips for Kali Linux Pi-Tail Edition☆11Dec 8, 2023Updated 2 years ago
- Medusa combo files, Hashcat rules and dictionaries, JRT rules☆14Oct 20, 2022Updated 3 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- ☆14Apr 20, 2023Updated 2 years ago
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- RedAudit is a next-generation Windows forensic and security assessment framework featuring a live cyber-operations GUI built for real inv…☆35Nov 15, 2025Updated 3 months ago
- Multi-threading Leaks/Intelligence file parser☆15Feb 9, 2026Updated last week
- Packet Sniffer for TI CC2531 and TI CC2540 dongles (C++)☆12May 3, 2022Updated 3 years ago