DDoS attacks via other sites execution tool (DAVOSET) - it is command line tool for conducting DDoS attacks on the sites via Abuse of Functionality and XML External Entities vulnerabilities at other sites.
☆127Dec 19, 2018Updated 7 years ago
Alternatives and similar repositories for DAVOSET
Users that are interested in DAVOSET are comparing it to the libraries listed below
Sorting:
- Programs for DoS and DDoS attacks.☆27Sep 13, 2018Updated 7 years ago
- DDoS Scripts for booters, Dedis and whatever.☆20Jun 28, 2015Updated 10 years ago
- Proof Of Concept for inserting code in ELF binaries.☆25Mar 14, 2014Updated 11 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Security scanner tool for Plone CMS.☆19May 14, 2012Updated 13 years ago
- Google Hack Database Web Site Scrapper w/ DB updater utility. ASP.NET MVC web utility and Windows application for generating google hack …☆11Jun 23, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Plugin for x64dbg☆13Apr 29, 2017Updated 8 years ago
- Poison, reset, spoof, redirect MITM script☆126Aug 5, 2023Updated 2 years ago
- Akamai Reflective DDoS Tool - Attack the origin host behind the Akamai Edge hosts and DDoS protection offered by Akamai services.☆263Jun 25, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/modscan☆29Sep 5, 2015Updated 10 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Credential and sensitive information harvester for kubernetes environments.☆11Mar 2, 2021Updated 4 years ago
- like hidden-tear with libsodium☆21Aug 20, 2015Updated 10 years ago
- Yara Plugin for Binary Ninja☆13Feb 13, 2018Updated 8 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Jul 26, 2016Updated 9 years ago
- R-U-Dead-Yet, or RUDY for short, implements the generic HTTP DoS attack via long form field submissions.☆23Dec 10, 2016Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Jul 18, 2019Updated 6 years ago
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆55May 8, 2021Updated 4 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆312Oct 22, 2016Updated 9 years ago
- Enterprise WPA Wireless Tool Suite☆87Sep 13, 2022Updated 3 years ago
- Simple PowerShell script to quickly add Windows Firewall Rules☆18Sep 14, 2017Updated 8 years ago
- Spur is a web based network configuration manager. It allows you to ssh or telnet to any networked device (cisco routers, linux hosts,etc…☆19Aug 7, 2012Updated 13 years ago
- Source code for the article "A bug story: data alignment on x86"☆17Nov 6, 2016Updated 9 years ago
- ☆15Aug 16, 2022Updated 3 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Apr 24, 2019Updated 6 years ago
- Finding Ethereum nodes which are vulnerable to RPC-attacks☆31May 25, 2016Updated 9 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Dec 3, 2014Updated 11 years ago
- Deploy a honeypot and a crypto currency miner together, so sweet.☆17Aug 12, 2018Updated 7 years ago
- Python Script to send message through http://pushover.net☆23Jun 10, 2025Updated 8 months ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆345Aug 14, 2022Updated 3 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆525Apr 13, 2017Updated 8 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago