MustLive / DAVOSET
DDoS attacks via other sites execution tool (DAVOSET) - it is command line tool for conducting DDoS attacks on the sites via Abuse of Functionality and XML External Entities vulnerabilities at other sites.
☆127Updated 6 years ago
Alternatives and similar repositories for DAVOSET:
Users that are interested in DAVOSET are comparing it to the libraries listed below
- Mass exploitation tool in python☆204Updated 6 years ago
- War Child denial of service testing suite☆122Updated 7 years ago
- A small python script to check for Cross-Site Tracing (XST)☆134Updated 9 years ago
- CookieCatcher☆143Updated 11 years ago
- search for hosts info with shodan☆231Updated 3 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆187Updated 5 years ago
- A keystroke logger to exploit XSS vulnerabilities in a site - for my personal Educational purposes only☆167Updated 3 years ago
- Create a DDOS attack using SNMP servers☆44Updated 11 years ago
- [unmaintained] Post-exploitation tool☆185Updated 9 years ago
- OWASP VBScan is a Black Box vBulletin Vulnerability Scanner☆328Updated 5 years ago
- The Cleveridge SSH Scanner is a SSH Brute Force tool written in python. The tool tries to get access to machines (IPv4) on the SSH port (…☆44Updated 7 years ago
- Yet another one hard-hitting tool to run HTTP stress tests 🌌☆175Updated 3 years ago
- Passive Vulnerability Auditor☆132Updated 8 years ago
- Generate Payloads and Control Remote Machines. [Discontinued]☆224Updated 3 years ago
- open source DDoS Amplification Tool with scanners.☆49Updated 7 years ago
- ☆192Updated 6 years ago
- Tools that are related to pentest and network security☆99Updated 3 years ago
- RSPET (Reverse Shell and Post Exploitation Tool) is a Python based reverse shell equipped with functionalities that assist in a post expl…☆261Updated 7 years ago
- ssh public host key scanner using shodan☆117Updated 6 years ago
- ssh management tool to provides commandline access to a remote system running SSH server☆75Updated 6 years ago
- Tulpar - Web Vulnerability Scanner☆200Updated 5 years ago
- Advanced Hash Manipulation☆176Updated 5 years ago
- A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.☆123Updated 2 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆221Updated last year
- Use your Shodan API Key to dump all the contents of exposed memcached servers.☆142Updated 7 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆121Updated 5 years ago
- Automated digital reconnaissance☆196Updated 2 years ago
- Web recon tool (find temporary files, parse robots.txt, search some folders, google dorks and search domains hosted on same server)☆104Updated 8 years ago
- Active/passive network scanner and autonomous vulnerability assessment application.☆75Updated 4 years ago
- The Hacker's ToolBox☆186Updated 7 years ago